id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-7hv5-hxph-jxm3 | Adobe Digital Editions versions 4.5.10.185749 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 9.8 | null |
|
GHSA-g889-x6p3-66f6 | Imate Webmail Server 2.5 allows remote attackers to cause a denial of service via a long HELO command. | [] | null | null | null | null |
|
CVE-2025-3790 | baseweb JSite Apache Druid Monitoring Console index.html access control | A vulnerability classified as critical has been found in baseweb JSite 1.0. This affects an unknown part of the file /druid/index.html of the component Apache Druid Monitoring Console. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 5.3 | 5.3 | 5 |
GHSA-3w7q-pf6h-jf9g | Multiple cross-site scripting (XSS) vulnerabilities in EJ3 BlackBook 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) bookCopyright and (2) ver parameters to (a) footer.php, and the (3) bookName, (4) bookMetaTags, and (5) estiloCSS parameters to (b) header.php. | [] | null | null | null | null |
|
RHSA-2012:0323 | Red Hat Security Advisory: httpd security update | httpd: ap_pregsub Integer overflow to buffer overflow httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix httpd: possible crash on shutdown due to flaw in scoreboard handling httpd: cookie exposure due to error responses | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-cvqf-ghfm-xpr4 | Persistent cross-site scripting in the web interface of ipDIO allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into a specific parameter. The XSS payload will be executed when a legitimate user attempts to review history. | [] | null | 6.1 | null | null |
|
GHSA-fp4p-m87h-5fx8 | The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value. | [] | null | 6 | null | null |
|
GHSA-44c3-695v-5q36 | MD News 1 allows remote attackers to bypass authentication via a direct request to a script in the Administration Area. | [] | null | null | null | null |
|
CVE-2009-4665 | Directory traversal vulnerability in CuteSoft_Client/CuteEditor/Load.ashx in CuteSoft Components Cute Editor for ASP.NET allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [
"cpe:2.3:a:cutesoft_components:cute_editor_for_asp.net:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
cisco-sa-20190417-wlan-hijack | Cisco Wireless LAN Controller Software Session Hijacking Vulnerability | A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system.
The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated user's browser session on the system.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlan-hijack ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlan-hijack"] | [] | null | null | 5.3 | null |
GHSA-3f95-w5h5-fq86 | Prototype Pollution in mergify | All versions of `mergify` are vulnerable to Prototype Pollution. The `mergify()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.RecommendationNo fix is currently available. Consider using an alternative module as the package is deprecated. | [] | null | null | null | null |
GHSA-x9mx-96mw-6xv3 | The Aramex Shipping WooCommerce plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.1.21. This is due the plugin not preventing direct access to the composer-setup.php file which also has display_errors enabled. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. | [] | null | 5.3 | null | null |
|
CVE-2022-43472 | WordPress eRoom plugin <= 1.4.6 - Broken Access Control vulnerability | Missing Authorization vulnerability in StylemixThemes eRoom – Zoom Meetings & Webinar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects eRoom – Zoom Meetings & Webinar: from n/a through 1.4.6. | [] | null | 4.3 | null | null |
GHSA-2jfj-pqmf-3wq3 | In the Linux kernel, the following vulnerability has been resolved:btrfs: zoned: return EIO on RAID1 block group write pointer mismatchThere was a bug report about a NULL pointer dereference in
__btrfs_add_free_space_zoned() that ultimately happens because a
conversion from the default metadata profile DUP to a RAID1 profile on two
disks.The stack trace has the following signature:BTRFS error (device sdc): zoned: write pointer offset mismatch of zones in raid1 profile
BUG: kernel NULL pointer dereference, address: 0000000000000058
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
RIP: 0010:__btrfs_add_free_space_zoned.isra.0+0x61/0x1a0
RSP: 0018:ffffa236b6f3f6d0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff96c8132f3400 RCX: 0000000000000001
RDX: 0000000010000000 RSI: 0000000000000000 RDI: ffff96c8132f3410
RBP: 0000000010000000 R08: 0000000000000003 R09: 0000000000000000
R10: 0000000000000000 R11: 00000000ffffffff R12: 0000000000000000
R13: ffff96c758f65a40 R14: 0000000000000001 R15: 000011aac0000000
FS: 00007fdab1cb2900(0000) GS:ffff96e60ca00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000058 CR3: 00000001a05ae000 CR4: 0000000000350ef0
Call Trace:
<TASK>
? __die_body.cold+0x19/0x27
? page_fault_oops+0x15c/0x2f0
? exc_page_fault+0x7e/0x180
? asm_exc_page_fault+0x26/0x30
? __btrfs_add_free_space_zoned.isra.0+0x61/0x1a0
btrfs_add_free_space_async_trimmed+0x34/0x40
btrfs_add_new_free_space+0x107/0x120
btrfs_make_block_group+0x104/0x2b0
btrfs_create_chunk+0x977/0xf20
btrfs_chunk_alloc+0x174/0x510
? srso_return_thunk+0x5/0x5f
btrfs_inc_block_group_ro+0x1b1/0x230
btrfs_relocate_block_group+0x9e/0x410
btrfs_relocate_chunk+0x3f/0x130
btrfs_balance+0x8ac/0x12b0
? srso_return_thunk+0x5/0x5f
? srso_return_thunk+0x5/0x5f
? __kmalloc_cache_noprof+0x14c/0x3e0
btrfs_ioctl+0x2686/0x2a80
? srso_return_thunk+0x5/0x5f
? ioctl_has_perm.constprop.0.isra.0+0xd2/0x120
__x64_sys_ioctl+0x97/0xc0
do_syscall_64+0x82/0x160
? srso_return_thunk+0x5/0x5f
? __memcg_slab_free_hook+0x11a/0x170
? srso_return_thunk+0x5/0x5f
? kmem_cache_free+0x3f0/0x450
? srso_return_thunk+0x5/0x5f
? srso_return_thunk+0x5/0x5f
? syscall_exit_to_user_mode+0x10/0x210
? srso_return_thunk+0x5/0x5f
? do_syscall_64+0x8e/0x160
? sysfs_emit+0xaf/0xc0
? srso_return_thunk+0x5/0x5f
? srso_return_thunk+0x5/0x5f
? seq_read_iter+0x207/0x460
? srso_return_thunk+0x5/0x5f
? vfs_read+0x29c/0x370
? srso_return_thunk+0x5/0x5f
? srso_return_thunk+0x5/0x5f
? syscall_exit_to_user_mode+0x10/0x210
? srso_return_thunk+0x5/0x5f
? do_syscall_64+0x8e/0x160
? srso_return_thunk+0x5/0x5f
? exc_page_fault+0x7e/0x180
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fdab1e0ca6d
RSP: 002b:00007ffeb2b60c80 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fdab1e0ca6d
RDX: 00007ffeb2b60d80 RSI: 00000000c4009420 RDI: 0000000000000003
RBP: 00007ffeb2b60cd0 R08: 0000000000000000 R09: 0000000000000013
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffeb2b6343b R14: 00007ffeb2b60d80 R15: 0000000000000001
</TASK>
CR2: 0000000000000058
---[ end trace 0000000000000000 ]---The 1st line is the most interesting here:BTRFS error (device sdc): zoned: write pointer offset mismatch of zones in raid1 profileWhen a RAID1 block-group is created and a write pointer mismatch between
the disks in the RAID set is detected, btrfs sets the alloc_offset to the
length of the block group marking it as full. Afterwards the code expects
that a balance operation will evacuate the data in this block-group and
repair the problems.But before this is possible, the new space of this block-group will be
accounted in the free space cache. But in __btrfs_
---truncated--- | [] | null | null | null | null |
|
CVE-2022-41690 | Improper access control in the Intel(R) Retail Edge Mobile iOS application before version 3.4.7 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:retail_edge_program:*:*:*:*:*:iphone_os:*:*"
] | null | 7.1 | null | null |
|
RHBA-2020:0675 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.5 packages update | jenkins: Inbound TCP Agent Protocol/3 authentication bypass jenkins: UDP multicast/broadcast service amplification reflection attack jenkins: Non-constant time comparison of inbound TCP agent connection secret jenkins: Non-constant time HMAC comparison jenkins: Exposed session identifiers on user detail object in the whoAmI diagnostic page jenkins: Memory usage graphs accessible to anyone with Overall/Read jenkins: REST APIs vulnerable to clickjacking | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 3.1 | null | null |
CVE-2007-5005 | Directory traversal vulnerability in rxRPC.dll in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allows remote attackers to upload and overwrite arbitrary files via a ..\ (dot dot backslash) sequence in the destination filename argument to sub-function 8 in the rxrReceiveFileFromServer command. | [
"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:desktop_management_suite:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:desktop_management_suite:11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-w87w-2qhp-g62j | PHP Scripts Mall PHP Multivendor Ecommerce has XSS via the my_wishlist.php fid parameter. | [] | null | null | 6.1 | null |
|
GHSA-hphg-c6x6-ff8h | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). | [] | null | 4.9 | null | null |
|
GHSA-5phh-m88v-jf8m | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in OceanWP Ocean Extra plugin <= 2.1.1 versions. Needs the OceanWP theme installed and activated. | [] | null | 5.4 | null | null |
|
CVE-2016-15007 | Centralized-Salesforce-Dev-Framework SOQL SObjectService.cls SObjectService injection | A vulnerability was found in Centralized-Salesforce-Dev-Framework. It has been declared as problematic. Affected by this vulnerability is the function SObjectService of the file src/classes/SObjectService.cls of the component SOQL Handler. The manipulation of the argument orderDirection leads to injection. The patch is named db03ac5b8a9d830095991b529c067a030a0ccf7b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217195. | [
"cpe:2.3:a:centralized_salesforce_development_framework_project:centralized_salesforce_development_framework:*:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 |
RHSA-2014:0520 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk kernel: pty layer race condition leading to memory corruption kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
GHSA-w7gg-cw7c-95wq | RPM secure Stream can access any secure resource due to improper SMMU configuration in Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | [] | null | 5.5 | null | null |
|
GHSA-3x5w-67jh-3785 | EnGenius ESR580 devices through 1.1.30 allow a remote attacker to conduct stored XSS attacks via the Wi-Fi SSID parameters. JavaScript embedded into a vulnerable field is executed when the user clicks the SSID field's corresponding EDIT button. | [] | null | 4.8 | null | null |
|
GHSA-5rfr-mxwv-h8rg | emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=import-category to admin/_cmdstat.jsp via the uploadFile attribute. | [] | null | null | null | null |
|
CVE-2009-2151 | Directory traversal vulnerability in index.php in AdaptWeb 0.9.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the newlang parameter. | [
"cpe:2.3:a:adaptweb:adaptweb:0.9.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2009-4135 | The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp. | [
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.91:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.92:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.93:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.94:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.95:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.96:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.97:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"
] | null | null | null | 4.4 |
|
GHSA-4rm5-v8f4-mx8v | The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103. | [] | null | null | null | null |
|
GHSA-x33v-3jxw-w5wf | Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | null | null | null |
|
GHSA-p9pq-9xhx-6pgq | A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 6.5 | null | null |
|
GHSA-57r7-qc46-rjx5 | Data exposure in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow sensitive data exposure. | [] | null | null | null | null |
|
CVE-2024-20760 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null |
GHSA-4h8r-4mvq-8gq4 | Soapbox through 0.3.1: Sandbox bypass - runs a second instance of Soapbox within a sandboxed Soapbox. | [] | null | 7.8 | null | null |
|
CVE-2014-3497 | Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header. | [
"cpe:2.3:a:openstack:swift:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:swift:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:swift:1.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:swift:1.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:swift:1.13.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:openstack:swift:1.13.1:rc2:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-x2p4-f3vf-gwp3 | Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments. | [] | null | null | null | null |
|
GHSA-2ww5-g3p9-xg2r | Multiple PHP remote file inclusion vulnerabilities in FirmWorX 0.1.2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) bank_data[root] parameter to modules/bank/includes/design/main.inc.php, or the (2) fm_data[root] parameter to (a) includes/config/master.inc.php or (b) includes/functions/master.inc.php. | [] | null | null | null | null |
|
CVE-2024-11733 | WordPress Popular Posts <= 7.1.0 - Unauthenticated Arbitrary Shortcode Execution | The The WordPress Popular Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 7.1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | [] | null | 7.3 | null | null |
RHSA-2023:5928 | Red Hat Security Advisory: tomcat security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
CVE-2023-42013 | IBM UrbanCode Deploy information disclosure | IBM UrbanCode Deploy (UCD) 7.1 through 7.1.2.14, 7.2 through 7.2.3.7, and 7.3 through 7.3.2.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 265510. | [
"cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-jr9h-58gc-725g | Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities. | [] | null | null | null | null |
|
CVE-2023-28322 | An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST. | [
"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_antivirus_connector:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*"
] | null | 3.7 | null | null |
|
CVE-2017-9346 | In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2024-12059 | ElementInvader Addons for Elementor <= 1.3.1 - Missing Authorization to Arbitrary Options Read | The ElementInvader Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.1 via the eli_option_value shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract arbitrary options from the wp_options table. | [] | null | 4.3 | null | null |
CVE-2017-5609 | SQL injection vulnerability in include/functions_entries.inc.php in Serendipity 2.0.5 allows remote authenticated users to execute arbitrary SQL commands via the cat parameter. | [
"cpe:2.3:a:s9y:serendipity:2.0.5:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-p7xp-hqxr-fpq2 | General Device Manager 2.5.2.2 is vulnerable to Buffer Overflow. | [] | null | 9.8 | null | null |
|
GHSA-5753-gp8w-7p39 | Cross-Site Scripting (XSS) vulnerability in every page that includes the "action" URL parameter in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 allows remote attackers to inject arbitrary web script or HTML via the action parameter. | [] | null | null | 6.1 | null |
|
CVE-2020-14660 | Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:crm_technical_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:crm_technical_foundation:12.1.3:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
|
GHSA-gpm8-35rq-5m79 | PHP remote file inclusion vulnerability in noticias.php in MNews 2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the inc parameter. | [] | null | null | null | null |
|
GHSA-759f-wjm2-mfxv | Windows Virtual Registry Provider Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2019-9456 | In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
PYSEC-2021-798 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for this situation. Hence, an attacker can read arbitrary data from the heap by carefully crafting a model with negative values in `indices`. Similar issue exists in [`Gather` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather.cc). We have patched the issue in GitHub commits bb6a0383ed553c286f87ca88c207f6774d5c4a8f and eb921122119a6b6e470ee98b89e65d721663179d. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | [] | null | null | null | null |
ICSA-23-166-01 | SUBNET PowerSYSTEM Center | SUBNET PowerSYSTEM Center versions 2020 U10 and prior contain a cross-site scripting vulnerability that may allow an attacker to inject malicious code into report header graphic files that could propagate out of the system and reach users who are subscribed to email notifications. SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity. | [] | null | null | 6.1 | null |
GHSA-wwch-cmqr-hhrm | ansible-runner has default temporary files written to world R/W locations | A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity. | [] | 6.8 | 6.6 | null | null |
CVE-2023-34132 | Use of password hash instead of password for authentication vulnerability in SonicWall GMS and Analytics allows Pass-the-Hash attacks. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | [
"cpe:2.3:a:sonicwall:analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:global_management_system:9.3.2:-:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:global_management_system:9.3.2:sp1:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
RHSA-2024:3855 | Red Hat Security Advisory: kernel security update | kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: KVM: s390: vsie: fix race during shadow creation kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: kvm: Avoid potential UAF in LPI translation cache | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.8 | null | null |
GHSA-h246-g39x-7vmx | Missing permission check in Jenkins XebiaLabs XL Deploy Plugin allows enumerating credentials IDs | Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier does not perform a permission check in a method implementing form validation.This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.An enumeration of credentials IDs in XebiaLabs XL Deploy Plugin 10.0.2 requires the appropriate permissions. | [] | null | 4.3 | null | null |
GHSA-53w3-6p88-3p2x | An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "ATS" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a crafted font. | [] | null | null | 7.1 | null |
|
RHSA-2023:1369 | Red Hat Security Advisory: nss security update | nss: Arbitrary memory write via PKCS 12 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
CVE-2019-5689 | NVIDIA GeForce Experience, all versions prior to 3.20.1, contains a vulnerability in the Downloader component in which a user with local system access can craft input that may allow malicious files to be downloaded and saved. This behavior may lead to code execution, denial of service, or information disclosure. | [
"cpe:2.3:a:nvidia:geforce_experience:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-w9mm-988w-25c6 | Cross-site scripting (XSS) vulnerability in recommend.php in Chipmunk Topsites script allows remote attackers to inject arbitrary web script or HTML via the ID parameter. | [] | null | null | null | null |
|
CVE-2014-5375 | The server in Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 does not properly validate the message owner matches the submitting user, which allows remote authenticated users to impersonate arbitrary users via the UserId and Owner tags. | [
"cpe:2.3:a:adaptivecomputing:moab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adaptivecomputing:moab:8.0:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-pp7c-r283-qv76 | A vulnerability classified as critical has been found in Shanghai Brad Technology BladeX 3.4.0. Affected is an unknown function of the file /api/blade-user/export-user of the component API. The manipulation with the input updatexml(1,concat(0x3f,md5(123456),0x3f),1)=1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258426 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 6.3 | null | null |
|
GHSA-h8rm-hh3j-prg6 | Unspecified vulnerability in HP Tru64 UNIX 5.1B PK2(BL22) and PK3(BL24), and 5.1A PK6(BL24), when using IPsec/IKE (Internet Key Exchange) with Certificates, allows remote attackers to gain privileges via unknown attack vectors. | [] | null | null | null | null |
|
CVE-2025-27817 | Apache Kafka Client: Arbitrary file read and SSRF vulnerability | A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sending requests to an unintended location. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use the "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url" configuratin to read arbitrary contents of the disk and environment variables or make requests to an unintended location. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment/URL access, which may be undesirable in certain environments, including SaaS products.
Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls") to set the allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all urls by default for backward compatibility. However in 4.0.0 and newer, the default value is empty list and users have to set the allowed urls explicitly. | [] | null | 7.5 | null | null |
CVE-2023-43343 | Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Files - Description parameter in the Pages Menu component. | [
"cpe:2.3:a:opensolution:quick_cms:6.7:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-qmp2-97fj-8p95 | The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_INFO shmctl call, as demonstrated by running the ipcs program. | [] | null | null | null | null |
|
CVE-2024-26521 | HTML Injection vulnerability in CE Phoenix v1.0.8.20 and before allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted payload to the english.php component. | [
"cpe:2.3:a:oscommerce:ce_phoenix:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
GHSA-pmrr-7vvq-vpj6 | Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread.c in OptiPNG 0.6.2 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted GIF image that causes the realloc function to return a new pointer, which triggers memory corruption when the old pointer is accessed. | [] | null | 7.8 | null | null |
|
CVE-2014-0754 | Directory traversal vulnerability in SchneiderWEB on Schneider Electric Modicon PLC Ethernet modules 140CPU65x Exec before 5.5, 140NOC78x Exec before 1.62, 140NOE77x Exec before 6.2, BMXNOC0401 before 2.05, BMXNOE0100 before 2.9, BMXNOE0110x Exec before 6.0, TSXETC101 Exec before 2.04, TSXETY4103x Exec before 5.7, TSXETY5103x Exec before 5.9, TSXP57x ETYPort Exec before 5.7, and TSXP57x Ethernet Copro Exec before 5.5 allows remote attackers to visit arbitrary resources via a crafted HTTP request. | [
"cpe:2.3:o:schneider-electric:stbnic2212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:stbnic2212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:stbnip2212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:stbnip2212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxetc0101_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxetc0101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxetc100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxetc100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp573623mc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp573623mc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxety110ws_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxety110ws:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp574634m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp574634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxety110wsc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxety110wsc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp574823am_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp574823am:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxety4103_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxety4103:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp574823m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp574823m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxety4103c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxety4103c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp574823mc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp574823mc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxety5103_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxety5103:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp575634m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp575634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxety5103c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxety5103c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp576634m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp576634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxetz410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxetz410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxwmy100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxwmy100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxetz510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxetz510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxwmy100c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxwmy100c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxntp100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxntp100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_bmxnoc0402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmxnoc0402:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxnoe0100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxnoe0100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxnoe0110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxnoe0110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxnoe0110h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxnoe0110h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxnor0200h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxnor0200h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp342020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp342020h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp342030_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342030:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp3420302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp3420302h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420302h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp342030h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342030h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxnoc0401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxnoc0401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:171ccc96020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:171ccc96020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:171ccc96020c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:171ccc96020c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:171ccc96030_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:171ccc96030:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:171ccc96030c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:171ccc96030c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:171ccc98020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:171ccc98020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:171ccc98030_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:171ccc98030:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp571634m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp571634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp572634m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp572634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp573634m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp573634m:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-3wf6-phm6-xcr4 | The Network Threat Protection module in the Manager component in Symantec Endpoint Protection (SEP) 11.0.600x through 11.0.700x on Windows Server 2003 allows remote attackers to cause a denial of service (web-server outage, or daemon crash or hang) via a flood of packets that triggers automated blocking of network traffic. | [] | null | null | null | null |
|
GHSA-64vp-q339-g7h5 | A vulnerability, which was classified as critical, was found in MONyog Ultimate 6.63. This affects an unknown part of the component Cookie Handler. The manipulation of the argument HasServerEdit/IsAdmin leads to privilege escalation. It is possible to initiate the attack remotely. | [] | null | 8.8 | null | null |
|
CVE-2005-3058 | Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortigate:2.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-97j6-v4p3-8f67 | An XSS issue was discovered in pfSense through 2.4.4-p3. In services_captiveportal_mac.php, the username and delmac parameters are displayed without sanitization. | [] | null | 6.1 | null | null |
|
GHSA-wq9f-w2rj-j5wc | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). | [] | null | 5.3 | null | null |
|
CVE-2018-16225 | The QBee MultiSensor Camera through 4.16.4 accepts unencrypted network traffic from clients (such as the QBee Cam application through 1.0.5 for Android and the Swisscom Home application up to 10.7.2 for Android), which results in an attacker being able to reuse cookies to bypass authentication and disable the camera. | [
"cpe:2.3:o:qbeecam:qbee_multi-sensor_camera_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:qbeecam:qbee_multi-sensor_camera:-:*:*:*:*:*:*:*",
"cpe:2.3:a:qbeecam:qbeecam:*:*:*:*:*:android:*:*",
"cpe:2.3:a:swisscom:swisscom_home_app:*:*:*:*:*:android:*:*"
] | null | null | 6.5 | 6.1 |
|
GHSA-38p9-hv7m-9vv5 | ** DISPUTED ** NOTE: this issue has been disputed by the upstream vendor. nasl/nasl_crypto2.c in the Nessus Attack Scripting Language library (aka libnasl) 2.2.11 does not properly check the return value from the OpenSSL DSA_do_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. NOTE: the upstream vendor has disputed this issue, stating "while we do misuse this function (this is a bug), it has absolutely no security ramification." | [] | null | null | null | null |
|
CVE-2024-24885 | WordPress Woocommerce Vietnam Checkout Plugin <= 2.0.7 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lê Văn Toản Woocommerce Vietnam Checkout allows Stored XSS.This issue affects Woocommerce Vietnam Checkout: from n/a through 2.0.7.
| [
"cpe:2.3:a:levantoan:woocommerce_vietnam_checkout:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-2020-1059 | A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content, aka 'Microsoft Edge Spoofing Vulnerability'. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
CVE-2024-12480 | cjbi wetech-cms TopicDao.java searchTopic sql injection | A vulnerability was found in cjbi wetech-cms 1.0/1.1/1.2. It has been classified as critical. Affected is the function searchTopic of the file wetech-cms-master\wetech-core\src\main\java\tech\wetech\cms\dao\TopicDao.java. The manipulation of the argument con leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:cjbi:wetech-cms:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cjbi:wetech-cms:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cjbi:wetech-cms:1.2:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2021-36389 | In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4". | [
"cpe:2.3:a:yellowfinbi:yellowfin:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2021-1441 | Cisco IOS XE Software Hardware Initialization Routines Arbitrary Code Execution Vulnerability | A vulnerability in the hardware initialization routines of Cisco IOS XE Software for Cisco 1100 Series Industrial Integrated Services Routers and Cisco ESR6300 Embedded Series Routers could allow an authenticated, local attacker to execute unsigned code at system boot time. This vulnerability is due to incorrect validations of parameters passed to a diagnostic script that is executed when the device boots up. An attacker could exploit this vulnerability by tampering with an executable file stored on a device. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. To exploit this vulnerability, the attacker would need administrative level credentials (level 15) on the device. | [
"cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ir1101:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
GHSA-hpw4-ph4f-2jvc | TS-WPTCAM firmware version 1.18 and earlier, TS-WPTCAM2 firmware version 1.00, TS-WLCE firmware version 1.18 and earlier, TS-WLC2 firmware version 1.18 and earlier, TS-WRLC firmware version 1.17 and earlier, TS-PTCAM firmware version 1.18 and earlier, TS-PTCAM/POE firmware version 1.18 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors. | [] | null | null | 8.8 | null |
|
CVE-2020-23490 | There was a local file disclosure vulnerability in AVideo < 8.9 via the proxy streaming. An unauthenticated attacker can exploit this issue to read an arbitrary file on the server. Which could leak database credentials or other sensitive information such as /etc/passwd file. | [
"cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-f7mm-qr3m-2g22 | Unspecified vulnerability in the %template package in InterSystems Cache' 5.0 allows attackers to access certain files on a server, including (1) cache.key and (2) cache.dat, related to .csp files under (a) Dev\studio\templates and (b) Devuser\studio\templates. | [] | null | null | null | null |
|
CVE-2018-17440 | An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. They expose an FTP server that serves by default on port 9000 and has hardcoded credentials (admin, admin). Taking advantage of this, a remote unauthenticated attacker could execute arbitrary PHP code by uploading any file in the web root directory and then accessing it via a request. | [
"cpe:2.3:a:dlink:central_wifimanager:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2025-23906 | WordPress WordPress Dashboard Tweeter plugin <= 1.3.2 - Settings Change vulnerability | Missing Authorization vulnerability in wpseek WordPress Dashboard Tweeter allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WordPress Dashboard Tweeter: from n/a through 1.3.2. | [] | null | 6.5 | null | null |
CVE-2025-27010 | WordPress Tastyc < 2.5.2 - Local File Inclusion Vulnerability | Path Traversal: '.../...//' vulnerability in bslthemes Tastyc allows PHP Local File Inclusion.This issue affects Tastyc: from n/a before 2.5.2. | [] | null | 8.1 | null | null |
CVE-2007-2155 | Directory traversal vulnerability in template.php in in phpFaber TopSites 3 allows remote attackers to read arbitrary files via a .. (dot dot) in the modify parameter in a template action to admin/index.php. | [
"cpe:2.3:a:phpfaber:topsites:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2021-37627 | Privilege escalation via form generator | Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users. | [
"cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao:4.10.0:*:*:*:*:*:*:*"
] | null | 8 | null | null |
GHSA-8c2c-jxwj-jqgf | Browsershot does not validate URL protocols passed to Browsershot URL method | Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the URL protocol passed to the Browsershot::url method. | [] | null | 8.2 | null | null |
GHSA-jpmg-v3vc-73pm | The thumb_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the thumb_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue. | [] | null | 5.4 | null | null |
|
CVE-2006-5585 | The Client-Server Run-time Subsystem in Microsoft Windows XP SP2 and Server 2003 allows local users to gain privileges via a crafted file manifest within an application, aka "File Manifest Corruption Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-35mv-vrc8-4x74 | The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function in libyara/scan.c. | [] | null | null | 7.1 | null |
|
CVE-2002-1970 | SnortCenter 0.9.5, when configured to push Snort rules, stores the rules in a temporary file with world-readable and world-writable permissions, which allows local users to obtain usernames and passwords for the alert database servers. | [
"cpe:2.3:a:snortcenter:snortcenter:0.9.5:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2024-29932 | WordPress WordPress Meta Data and Taxonomies Filter (MDTF) plugin <= 1.3.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF) allows Stored XSS.This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.2.
| [] | null | 6.5 | null | null |
CVE-2025-47687 | WordPress StoreKeeper for WooCommerce <= 14.4.4 - Arbitrary File Upload Vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce allows Upload a Web Shell to a Web Server. This issue affects StoreKeeper for WooCommerce: from n/a through 14.4.4. | [] | null | 10 | null | null |
CVE-2018-17569 | network/nw_buf.c in ViaBTC Exchange Server before 2018-08-21 has an integer overflow leading to memory corruption. | [
"cpe:2.3:a:viabtc:viabtc_exchange_server:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
cisco-sa-20180418-MATE1 | Cisco MATE Live Directory Information Disclosure Vulnerability | A vulnerability in the web interface of Cisco MATE Live could allow an unauthenticated, remote attacker to view and download the contents of certain web application virtual directories.
The vulnerability is due to lack of proper input validation and authorization of HTTP requests. An attacker could exploit this vulnerability by sending a malicious HTTP request to the targeted application. An exploit could allow the attacker to view sensitive information that should require authentication.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-MATE1 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-MATE1"] | [] | null | null | 5.3 | null |
CVE-2020-7011 | Elastic App Search versions before 7.7.0 contain a cross site scripting (XSS) flaw when displaying document URLs in the Reference UI. If the Reference UI injects a URL into a result, that URL will be rendered by the web browser. If an attacker is able to control the contents of such a field, they could execute arbitrary JavaScript in the victim�s web browser. | [
"cpe:2.3:a:elastic:elastic_app_search:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-p95v-prm4-r932 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] | null | null | 8.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.