id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-9rmr-pw3x-x887 | A reachable assertion in the Mobile Management Entity (MME) of Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows remote attackers to crash the MME with an unauthenticated cellphone by sending a NAS packet containing an `Emergency Number List` Information Element. | [] | null | 7.5 | null | null |
|
CVE-2012-2690 | virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information. | [
"cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.10:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.11:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.12:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.13:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.14:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.15:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.16:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.17:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.18:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.19:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.20:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.21:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.22:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.23:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.24:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.25:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.16.26:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.10:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.11:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.12:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.13:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.14:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.15:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.16:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.17:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.18:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.19:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.20:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.21:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.22:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.23:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.24:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.25:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.26:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.27:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.28:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.29:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.30:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.31:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.32:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.33:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.34:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.35:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.36:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.37:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.38:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.39:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.40:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.41:*:*:*:*:*:*:*",
"cpe:2.3:a:libguestfs:libguestfs:1.17.42:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2024-5397 | itsourcecode Online Student Enrollment System instructorSubjects.php sql injection | A vulnerability classified as critical was found in itsourcecode Online Student Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file instructorSubjects.php. The manipulation of the argument instructorId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266311. | [
"cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2024-48788 | An issue in YESCAM (com.yescom.YesCam.zwave) 1.0.2 allows a remote attacker to obtain sensitive information via the firmware update process. | [
"cpe:2.3:o:yescam:yescam_firmware:1.0.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2022-31301 | Haraj v3.7 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Post Ads component. | [
"cpe:2.3:a:angtech:haraj:3.7:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-mmcm-8vr2-mmc9 | A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6. An app may be able to access protected user data. | [] | null | 5.5 | null | null |
|
RHSA-2014:0136 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) OpenJDK: insecure subject principals set handling (JAAS, 8024306) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
CVE-2024-57647 | An issue in the row_insert_cast component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [] | null | 7.5 | null | null |
|
GHSA-5gfx-64wm-m22c | An issue was discovered in Zammad before 3.4.1. There is Stored XSS via a Tags element in a TIcket. | [] | null | null | null | null |
|
CVE-2020-12488 | Broken Access Control Vulnerability in Jovi Smart Scene | The attacker can access the sensitive information stored within the jovi Smart Scene module by entering carefully constructed commands without requesting permission. | [
"cpe:2.3:a:vivo:jovi_smart_scene:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2022-28713 | Improper authentication vulnerability in Scheduler of Cybozu Garoon 4.10.0 to 5.5.1 allows a remote attacker to obtain some data of Facility Information without logging in to the product. | [
"cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2007-3105 | Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering". NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-wf6p-hgq4-x57x | An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability. | [] | null | null | 7.8 | null |
|
CVE-2024-21772 | Uncontrolled search path in some Intel(R) Advisor software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:advisor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
CVE-2024-0778 | Uniview ISC 2500-S VM.php setNatConfig os command injection | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in Uniview ISC 2500-S up to 20210930. Affected by this issue is the function setNatConfig of the file /Interface/DevManage/VM.php. The manipulation of the argument natAddress/natPort/natServerPort leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251696. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | [
"cpe:2.3:o:uniview:isc_2500-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:uniview:isc_2500-s:-:*:*:*:*:*:*:*"
] | null | 8 | 8 | 7.7 |
CVE-2024-36681 | SQL Injection vulnerability in the module "Isotope" (pk_isotope) <=1.7.3 from Promokit.eu for PrestaShop allows attackers to obtain sensitive information and cause other impacts via `pk_isotope::saveData` and `pk_isotope::removeData` methods. | [
"cpe:2.3:a:promokit:pk_isotope:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-x744-f9cr-wcfc | Uncontrolled search path elements in the Intel(R) Datacenter Group Event Android application, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 7.8 | null | null |
|
RHSA-2016:0675 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) OpenJDK: insufficient DSA key parameters checks (Security, 8138593) OpenJDK: incorrect handling of surrogate pairs in XML attribute values (JAXP, 8143167) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2020-12469 | admin/blocks.php in Subrion CMS through 4.2.1 allows PHP Object Injection (with resultant file deletion) via serialized data in the subpages value within a block to blocks/edit. | [
"cpe:2.3:a:intelliants:subrion:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 5.5 |
|
CVE-2020-0689 | A security feature bypass vulnerability exists in secure boot, aka 'Microsoft Secure Boot Security Feature Bypass Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
GHSA-c8xg-hw5v-j58h | An OS command injection vulnerability exists in the m2m DELETE_FILE cmd functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability. | [] | null | 9.8 | null | null |
|
RHSA-2025:7694 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Privilege escalation in Firefox Updater firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames firefox: thunderbird: Unsafe attribute access during XPath parsing firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
GHSA-r2jr-v83g-c59g | An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any subnetmask values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled subnet-mask=‘) in length. A subnetmask value of length 0x3d9 will cause the service to crash. | [] | null | null | null | null |
|
CVE-2019-15224 | The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected. | [
"cpe:2.3:a:rest-client_project:rest-client:*:*:*:*:*:ruby:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-w7wr-8ggv-cvqw | A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b. | [] | null | 4.7 | null | null |
|
CVE-2009-5155 | In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match. | [
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2025-1326 | Homey - Booking and Rentals WordPress Theme <= 2.4.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Reservation & Post Deletion | The Homey theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the homey_reservation_del() function in all versions up to, and including, 2.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary reservations and posts. | [] | null | 4.3 | null | null |
GHSA-9qjj-g7jc-qv64 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Neil Gee Smoothscroller plugin <= 1.0.0 versions. | [] | null | 5.9 | null | null |
|
CVE-2025-2551 | D-Link DIR-618/DIR-605L formSetPortTr access control | A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been classified as problematic. This affects an unknown part of the file /goform/formSetPortTr. The manipulation leads to improper access controls. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | [] | 5.3 | 4.3 | 4.3 | 3.3 |
CVE-2015-4074 | Directory traversal vulnerability in the Helpdesk Pro plugin before 1.4.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter in a ticket.download_attachment task. | [
"cpe:2.3:a:helpdesk_pro_project:helpdesk_pro:*:*:*:*:*:joomla\\!:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2001-0801 | lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. | [
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2025-22884 | ISPSoft File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability | Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file. | [] | null | 7.8 | null | null |
CVE-2023-30737 | Improper access control vulnerability in Samsung Health prior to version 6.24.3.007 allows attackers to access sensitive information via implicit intent. | [
"cpe:2.3:a:samsung:health:*:*:*:*:*:*:*:*"
] | null | 4 | null | null |
|
CVE-2024-51550 | Data Validation / Sanitization | Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in an Aspect device.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02 | [
"cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*"
] | 9.3 | 10 | null | null |
CVE-2008-5686 | IBM Tivoli Provisioning Manager (TPM) before 5.1.1.1 IF0006, when its LDAP service is shared with other applications, does not require that an LDAP user be listed in the TPM user records, which allows remote authenticated users to execute SOAP commands that access arbitrary TPM functionality, as demonstrated by running provisioning workflows. | [
"cpe:2.3:a:ibm:tivoli_provisioning_manager:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_provisioning_manager:5.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_provisioning_manager:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_provisioning_manager:5.1.1.1:*:*:*:*:*:*:*"
] | null | null | null | 8.5 |
|
CVE-2008-3229 | Stack-based buffer overflow in op before Changeset 563, when xauth support is enabled, allows local users to gain privileges via a long XAUTHORITY environment variable. | [
"cpe:2.3:a:swapoff:op:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:swapoff:op:1.32:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-x5vw-mf64-c93p | The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index. | [] | null | null | null | null |
|
CVE-2006-5788 | PHP remote file inclusion vulnerability in (1) index.php and (2) admin/index.php in IPrimal Forums as of 20061105 allows remote attackers to execute arbitrary PHP code via a URL in the p parameter. | [
"cpe:2.3:a:iprimal:iprimal_forums:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-g2xg-vq5p-8wvv | The reset password page in Puppet Enterprise before 3.0.1 does not force entry of the current password, which allows attackers to modify user passwords by leveraging session hijacking, an unattended workstation, or other vectors. | [] | null | null | null | null |
|
GHSA-wrgf-6m9j-q9hq | Directory traversal vulnerability in PostNuke 0.723 and earlier allows remote attackers to include arbitrary files named theme.php via the theme parameter to index.php. | [] | null | null | null | null |
|
RHSA-2020:4291 | Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security and bug fix update | QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 5 | null | null |
GHSA-9jmh-rhgv-38vc | IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security, caused by the improper encoding in a local configuration file. IBM X-Force ID: 258637. | [] | null | 5.1 | null | null |
|
CVE-2021-26199 | An issue was discovered in JerryScript 2.4.0. There is a heap-use-after-free in ecma_bytecode_ref in ecma-helpers.c file. | [
"cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2017-17996 | A buffer overflow vulnerability in "Add command" functionality exists in Flexense SyncBreeze Enterprise <= 10.3.14. The vulnerability can be triggered by an authenticated attacker who submits more than 5000 characters as the command name. It will cause termination of the SyncBreeze Enterprise server and possibly remote command execution with SYSTEM privilege. | [
"cpe:2.3:a:flexense:syncbreeze:*:*:*:*:enterprise:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2017-9211 | The crypto_skcipher_init_tfm function in crypto/skcipher.c in the Linux kernel through 4.11.2 relies on a setkey function that lacks a key-size check, which allows local users to cause a denial of service (NULL pointer dereference) via a crafted application. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
CVE-2023-1778 | Default Credential Vulnerability in GajShield Data Security Firewall | This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems.
The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.
| [
"cpe:2.3:o:gajshield:data_security_firewall_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gajshield:data_security_firewall:-:*:*:*:*:*:*:*"
] | null | 10 | null | null |
GHSA-vhgj-m2g2-6jfx | A vulnerability, which was classified as critical, was found in CodeZips Project Management System 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-932h-84vw-p6cw | In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Avoid field-overflowing memcpy()In preparation for FORTIFY_SOURCE performing compile-time and run-time
field bounds checking for memcpy(), memmove(), and memset(), avoid
intentionally writing across neighboring fields.Use flexible arrays instead of zero-element arrays (which look like they
are always overflowing) and split the cross-field memcpy() into two halves
that can be appropriately bounds-checked by the compiler.We were doing:target is wqe->eth.inline_hdr.start (which the compiler sees as being
2 bytes in size), but copying 18, intending to write across start
(really vlan_tci, 2 bytes). The remaining 16 bytes get written into
wqe->data[0], covering byte_count (4 bytes), lkey (4 bytes), and addr
(8 bytes).struct mlx5e_tx_wqe {
struct mlx5_wqe_ctrl_seg ctrl; /* 0 16 */
struct mlx5_wqe_eth_seg eth; /* 16 16 */
struct mlx5_wqe_data_seg data[]; /* 32 0 */};struct mlx5_wqe_eth_seg {
u8 swp_outer_l4_offset; /* 0 1 */
u8 swp_outer_l3_offset; /* 1 1 */
u8 swp_inner_l4_offset; /* 2 1 */
u8 swp_inner_l3_offset; /* 3 1 */
u8 cs_flags; /* 4 1 */
u8 swp_flags; /* 5 1 */
__be16 mss; /* 6 2 */
__be32 flow_table_metadata; /* 8 4 */
union {
struct {
__be16 sz; /* 12 2 */
u8 start[2]; /* 14 2 */
} inline_hdr; /* 12 4 */
struct {
__be16 type; /* 12 2 */
__be16 vlan_tci; /* 14 2 */
} insert; /* 12 4 */
__be32 trailer; /* 12 4 */
}; /* 12 4 */};struct mlx5_wqe_data_seg {
__be32 byte_count; /* 0 4 */
__be32 lkey; /* 4 4 */
__be64 addr; /* 8 8 */};So, split the memcpy() so the compiler can reason about the buffer
sizes."pahole" shows no size nor member offset changes to struct mlx5e_tx_wqe
nor struct mlx5e_umr_wqe. "objdump -d" shows no meaningful object
code changes (i.e. only source line number induced differences and
optimizations). | [] | null | null | null | null |
|
GHSA-rfgw-5vq3-wrjf | Buffer Overflow vulnerability in HDFGroup hdf5-h5dump 1.12.0 through 1.13.0 allows attackers to cause a denial of service via h5tools_str_sprint in /hdf5/tools/lib/h5tools_str.c. | [] | null | 7.5 | null | null |
|
GHSA-2qcm-46qf-rxjj | A vulnerability in local FTP to the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition when the FTP application unexpectedly quits. More Information: CSCux68539. Known Affected Releases: 9.1.0-032 9.7.1-000. Known Fixed Releases: 9.1.1-038. | [] | null | null | 7.5 | null |
|
GHSA-qmx9-wr57-3mx9 | Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter on the registration page. | [] | null | 5.4 | null | null |
|
GHSA-j7j7-g4ww-pxg5 | Missing certificate validation in Apache JMeter | In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code. This only affect those running in Distributed mode.In distributed mode, JMeter makes an architectural assumption that it is operating on a 'safe' network. i.e. everyone with access to the network is considered trusted. | [] | null | null | 9.8 | null |
CVE-2013-5510 | The remote-access VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.6.x before 8.6(1.12), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.5), when an override-account-disable option is enabled, does not properly parse AAA LDAP responses, which allows remote attackers to bypass authentication via a VPN connection attempt, aka Bug ID CSCug83401. | [
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.28\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.31\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.35\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.38\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(4.11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(1.7\\):*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-5xfp-w3p6-rw45 | Multiple PHP file inclusion vulnerabilities in 2BGal 3.0 allow remote attackers to execute arbitrary PHP code via the lang parameter to (1) admin/configuration.inc.php, (2) admin/creer_album.inc.php, (3) admin/changepwd.php.inc, and unspecified other files. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-m65h-2c6x-9769 | Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability container volume management component in Synology Docker before 18.09.0-0515 allows local users to read or write arbitrary files via unspecified vectors. | [] | null | null | null | null |
|
ICSMA-18-156-01 | Philips' IntelliVue Patient and Avalon Fetal Monitors | The vulnerability allows an unauthenticated attacker to access memory (write-what-where) from an attacker-chosen device address within the same subnet.CVE-2018-10597 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). The vulnerability allows an unauthenticated attacker to read memory from an attacker-chosen device address within the same subnet.CVE-2018-10599 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). The vulnerability exposes an echo service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.CVE-2018-10601 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H). | [] | null | null | 8.2 | null |
CVE-2022-49334 | mm/huge_memory: Fix xarray node memory leak | In the Linux kernel, the following vulnerability has been resolved:
mm/huge_memory: Fix xarray node memory leak
If xas_split_alloc() fails to allocate the necessary nodes to complete the
xarray entry split, it sets the xa_state to -ENOMEM, which xas_nomem()
then interprets as "Please allocate more memory", not as "Please free
any unnecessary memory" (which was the intended outcome). It's confusing
to use xas_nomem() to free memory in this context, so call xas_destroy()
instead. | [] | null | 5.5 | null | null |
CVE-2015-1171 | Stack-based buffer overflow in GSM SIM Utility (aka SIM Card Editor) 6.6 allows remote attackers to execute arbitrary code via a long entry in a .sms file. | [
"cpe:2.3:a:gsm:sim_card_editor:6.6:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2024:8703 | Red Hat Security Advisory: container-tools:rhel8 security update | buildah: Buildah allows arbitrary directory mount | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.8 | null | null |
CVE-2016-5974 | Cross-site scripting (XSS) vulnerability in the Web UI in IBM Security Privileged Identity Manager (ISPIM) Virtual Appliance 2.x before 2.0.2 FP8 allows remote authenticated users to inject arbitrary web script or HTML via an embedded string. | [
"cpe:2.3:a:ibm:security_privileged_identity_manager_virtual_appliance:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
CVE-2006-4306 | Unspecified vulnerability in Sun Solaris 8 and 9 before 20060821 allows local users to execute arbitrary commands via unspecified vectors, involving the default Role-Based Access Control (RBAC) settings in the "File System Management" profile. | [
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-6vcw-rc44-857p | A vulnerability in the Trusted Platform Module (TPM) functionality of software for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, local attacker with physical access to view sensitive information on an affected device. The vulnerability is due to a lack of proper data-protection mechanisms for disk encryption keys that are used within the partitions on an affected device hard drive. An attacker could exploit this vulnerability by obtaining physical access to the affected device to view certain cleartext keys. A successful exploit could allow the attacker to execute a custom boot process or conduct further attacks on an affected device. | [] | null | null | null | null |
|
CVE-2001-1418 | AOL Instant Messenger (AIM) 4.7 allows remote attackers to cause a denial of service (application crash) via a malformed WAV file. | [
"cpe:2.3:a:aol:instant_messenger:4.7:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-rfp9-6j63-rc88 | This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8. An unprivileged app may be able to log keystrokes in other apps including those using secure input mode. | [] | null | 3.3 | null | null |
|
CVE-2020-23992 | Cross Site Scripting (XSS) in Nagios XI 5.7.1 allows remote attackers to run arbitrary code via returnUrl parameter in a crafted GET request. | [
"cpe:2.3:a:nagios:nagios_xi:5.7.1:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-96hp-38wx-j3wc | Pimcore vulnerable to Cross Site Scripting in Email Blacklist | ImpactThe attacker can execute arbitrary JavaScript and steal Cookies information and use them to hijack the user's session.PatchesUpdate to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/pull/14467.patchWorkaroundsApply https://github.com/pimcore/pimcore/pull/14467.patch manually.Referenceshttps://huntr.dev/bounties/3245ff99-9adf-4db9-af94-f995747e09d1/ | [] | null | 5.4 | null | null |
CVE-2019-9767 | Stack-based buffer overflow in Free MP3 CD Ripper 2.6, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted .wma file. | [
"cpe:2.3:a:cleanersoft:free_mp3_cd_ripper:2.6:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2019-5274 | USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products. | [
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2019-19000 | eSOMS Cachecontrol (Pragma) HTTP Header | For ABB eSOMS 4.0 to 6.0.3, the Cache-Control and Pragma HTTP header(s) have not been properly configured within the application response. This can potentially allow browsers and proxies to cache sensitive information. | [
"cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-f6g5-qxjh-9963 | libnetcore in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to cause a denial of service (memory corruption and application crash) via a crafted configuration profile. | [] | null | null | null | null |
|
GHSA-58xv-7h9r-mx3c | Drupal Malicious file upload with filenames stating with dot | Drupal 8 core's file_save_upload() function does not strip the leading and trailing dot ('.') from filenames, like Drupal 7 did.Users with the ability to upload files with any extension in conjunction with contributed modules may be able to use this to upload system files such as .htaccess in order to bypass protections afforded by Drupal's default .htaccess file.After this fix, file_save_upload() now trims leading and trailing dots from filenames. | [] | null | null | null | null |
CVE-2016-3353 | Microsoft Internet Explorer 9 through 11 mishandles .url files from the Internet zone, which allows remote attackers to bypass intended access restrictions via a crafted file, aka "Internet Explorer Security Feature Bypass." | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | 8.3 | 5.1 |
|
CVE-2024-50060 | io_uring: check if we need to reschedule during overflow flush | In the Linux kernel, the following vulnerability has been resolved:
io_uring: check if we need to reschedule during overflow flush
In terms of normal application usage, this list will always be empty.
And if an application does overflow a bit, it'll have a few entries.
However, nothing obviously prevents syzbot from running a test case
that generates a ton of overflow entries, and then flushing them can
take quite a while.
Check for needing to reschedule while flushing, and drop our locks and
do so if necessary. There's no state to maintain here as overflows
always prune from head-of-list, hence it's fine to drop and reacquire
the locks at the end of the loop. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2017-17321 | Huawei eNSP software with software of versions earlier than V100R002C00B510 has a buffer overflow vulnerability. Due to the improper validation of specific command line parameter, a local attacker could exploit this vulnerability to cause the software process abnormal. | [
"cpe:2.3:o:huawei:ensp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ensp:-:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 |
|
CVE-2010-2233 | tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used in ImageMagick, does not properly perform vertical flips, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF image, related to "downsampled OJPEG input." | [
"cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2009-0889 | Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0510, CVE-2009-0511, CVE-2009-0512, and CVE-2009-0888. | [
"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:elements:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:security_update:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2014-3764 | Cross-site scripting (XSS) vulnerability in the web-based device management interface in Palo Alto Networks PAN-OS before 5.0.15, 5.1.x before 5.1.10, and 6.0.x before 6.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Ref ID 64563. | [
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:5.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:6.0.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-3vrx-9pq3-23gp | Compaq TruCluster 1.5 allows remote attackers to cause a denial of service via a port scan from a system that does not have a DNS PTR record, which causes the cluster to enter a "split-brain" state. | [] | null | null | null | null |
|
GHSA-2hjv-5gg5-2v4c | Multiple SQL injection vulnerabilities in TCExam before 5.1.000 allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | [] | null | null | null | null |
|
CVE-2022-30546 | Out-of-bounds read vulnerability exists in the simulator module contained in the graphic editor 'V-SFT' versions prior to v6.1.6.0, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file. | [
"cpe:2.3:a:fujielectric:monitouch_v-sft:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
RHSA-2022:6560 | Red Hat Security Advisory: Openshift Logging Bug Fix Release and Security Update (5.3.12) | golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:logging:5.3::el8"
] | null | 7.5 | null | null |
GHSA-hgvv-9m7h-78q7 | Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause kernel privilege escalation, which results in system service exceptions. | [] | null | 9.8 | null | null |
|
CVE-2023-3541 | ThinuTech ThinuCMS author_posts.php cross site scripting | A vulnerability has been found in ThinuTech ThinuCMS 1.5 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /author_posts.php. The manipulation of the argument author with the input g6g12<script>alert(1)</script>o8sdm leads to cross site scripting. The attack can be launched remotely. The identifier VDB-233293 was assigned to this vulnerability. | [
"cpe:2.3:a:thinutech:thinu-cms:1.5:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
cisco-sa-ndb-mhcvuln-vpsBPJ9y | Cisco Nexus Dashboard Unauthorized Access Vulnerabilities | Multiple vulnerabilities in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to execute arbitrary commands, read or upload container image files, or perform a cross-site request forgery attack.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
| [] | null | 8.8 | null | null |
CVE-2022-47415 | LogicalDOC Messaging Stored XSS | LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the in-app messaging system (both subject and message bodies). | [
"cpe:2.3:a:logicaldoc:logicaldoc:8.7.3:*:*:*:community:*:*:*",
"cpe:2.3:a:logicaldoc:logicaldoc:8.8.2:*:*:*:enterprise:*:*:*"
] | null | 5.4 | null | null |
GHSA-qp9p-388h-gp24 | A vulnerability in all versions of Kuba allows attackers to overwrite arbitrary files in arbitrary directories with crafted Zip files due to improper validation of file paths in .zip archives. | [] | null | null | null | null |
|
CVE-2021-3258 | Question2Answer Q2A Ultimate SEO Version 1.3 is affected by cross-site scripting (XSS), which may lead to arbitrary remote code execution. | [
"cpe:2.3:a:qa-themes:q2a_ultimate_seo:1.3:*:*:*:*:question2answer:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-3862-fmr3-4f3h | Broadleaf vulnerable to Cross-site Scripting | Broadleaf 5.x and 6.x (including 5.2.25-GA and 6.2.6-GA) was discovered to contain a cross-site scripting (XSS) vulnerability via a customer signup with a crafted email address. This is fixed in 6.2.7-GA. | [] | null | 6.1 | null | null |
GHSA-4f9h-qqq9-757g | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation apache fineract. Authorized users may be able to exploit this for limited impact on components. This issue affects apache fineract: from 1.4 through 1.8.2. | [] | null | 6.3 | null | null |
|
CVE-2018-1000846 | FreshDNS version 1.0.3 and earlier contains a Cross ite Request Forgery (CSRF) vulnerability in All (authenticated) API calls in index.php / class.manager.php that can result in Editing domains and zones with victim's privileges. This attack appear to be exploitable via Victim must open a website containing attacker's javascript. This vulnerability appears to have been fixed in 1.0.5 and later. | [
"cpe:2.3:a:freshdns_project:freshdns:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2008-7290 | Memory leak in the ldap_explode_rdn API function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allows remote authenticated users to cause a denial of service (memory consumption) by making many function calls. | [
"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2020-14811 | Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: AMP EBS Integration). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:applications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_manager:12.1.3:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-4h4q-q4v8-2vq3 | An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks. | [] | null | null | null | null |
|
CVE-2017-17825 | The Batch Manager component of Piwigo 2.9.2 is vulnerable to Persistent Cross Site Scripting via tags-* array parameters in an admin.php?page=batch_manager&mode=unit request. An attacker can exploit this to hijack a client's browser along with the data stored in it. | [
"cpe:2.3:a:piwigo:piwigo:2.9.2:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2008-0406 | HTTP File Server (HFS) before 2.2c, when account names are used as log filenames, allows remote attackers to cause a denial of service (daemon crash) via a long account name. | [
"cpe:2.3:a:hfs:http_file_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2014-0229 | Apache Hadoop 0.23.x before 0.23.11 and 2.x before 2.4.1, as used in Cloudera CDH 5.0.x before 5.0.2, do not check authorization for the (1) refreshNamenodes, (2) deleteBlockPool, and (3) shutdownDatanode HDFS admin commands, which allows remote authenticated users to cause a denial of service (DataNodes shutdown) or perform unnecessary operations by issuing a command. | [
"cpe:2.3:a:cloudera:cdh:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:5.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:0.23.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.0.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.0.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.0.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.0.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.4.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-mc83-gm47-m9vc | A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. | [] | null | null | null | null |
|
CVE-2020-18169 | A vulnerability in the Windows installer XML (WiX) toolset of TechSmith Snagit 19.1.1.2860 allows attackers to escalate privileges. NOTE: Exploit of the Snagit installer would require the end user to ignore other safety mechanisms provided by the Host OS. See reference document for more details | [
"cpe:2.3:a:techsmith:snagit:19.1.1.2860:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.4 |
|
GHSA-wvph-mf6h-fpww | The WP Church Donation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several donation form submission parameters in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 7.2 | null | null |
|
CVE-2025-2857 | Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape.
The original vulnerability was being exploited in the wild.
*This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1. | [] | null | 10 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.