id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2017-7082 | An issue was discovered in certain Apple products. macOS before 10.13 is affected. The issue involves the "Screen Lock" component. It allows physically proximate attackers to read Application Firewall prompts. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 2.4 | 2.1 |
|
GHSA-2fmx-8p94-cm2g | Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
GHSA-xc3j-p373-xcmj | Eval injection vulnerability in globalsoff.php in Turnkey PHP Live Helper 2.0.1 and earlier allows remote attackers to execute arbitrary PHP code via the test parameter, and probably arbitrary parameters, to chat.php. | [] | null | null | null | null |
|
CVE-2017-11696 | Heap-based buffer overflow in the __hash_open function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file. | [
"cpe:2.3:a:mozilla:network_security_services:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
RHSA-2013:1537 | Red Hat Security Advisory: augeas security, bug fix, and enhancement update | augeas: susceptible to symlink attack augeas: susceptible to mountpoint attack | [
"cpe:/a:redhat:enterprise_linux:6::hypervisor",
"cpe:/a:redhat:storage:3:server:el6",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-2r6c-crq4-rgxw | Multiple exploitable buffer overflow vulnerabilities exist in the credentials handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. A strncpy overflows the destination buffer, which has a size of 16 bytes. An attacker can send an arbitrarily long "region" value in order to exploit this vulnerability. | [] | null | null | 9.9 | null |
|
CVE-2014-0413 | Unspecified vulnerability in the Oracle Containers for J2EE component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect integrity via vectors related to HTTP Request Handling, a different vulnerability than CVE-2014-0426. | [
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
ICSA-18-100-02 | Omron CX-One | Parsing malformed project files may cause a heap-based buffer overflow.CVE-2018-8834 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Parsing malformed project files may cause a stack-based buffer overflow.CVE-2018-7514 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Parsing malformed project files may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.CVE-2018-7530 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). | [] | null | null | 5.3 | null |
GHSA-qhjv-5rf9-mm67 | Cross-site scripting (XSS) vulnerability in Zimbra Collaboration before 8.7.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka bug 103609. | [] | null | null | 6.1 | null |
|
GHSA-8g49-cpfw-2gpm | Cross-site scripting (XSS) vulnerability in articles.php in EDGEPHP EZArticles allows remote attackers to inject arbitrary web script or HTML via the title parameter. | [] | null | null | null | null |
|
GHSA-wp7p-m228-g97j | Symantec Advanced Secure Gateway (ASG) 6.6 prior to 6.6.5.13, ASG 6.7 prior to 6.7.3.1, ProxySG 6.5 prior to 6.5.10.6, ProxySG 6.6 prior to 6.6.5.13, and ProxySG 6.7 prior to 6.7.3.1 are susceptible to an information disclosure vulnerability. An attacker with local access to the client host of an authenticated administrator user can, under certain circumstances, obtain sensitive authentication credential information. | [] | null | null | 7.8 | null |
|
GHSA-qjj3-c863-xg64 | In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453600; Issue ID: ALPS07453600. | [] | null | 6.7 | null | null |
|
CVE-2018-4073 | An exploitable Permission Assignment vulnerability exists in the ACEManager EmbeddedAceSet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The the binary the endpoint /cgi-bin/Embeded_Ace_TLSet_Task.cgi is a very similar endpoint that is designed for use with setting table values that can cause an arbitrary setting writes, resulting in the unverified changes to any system setting. An attacker can make an authenticated HTTP request, or run the binary as any user, to trigger this vulnerability. | [
"cpe:2.3:o:sierrawireless:airlink_es450_firmware:4.9.3:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_es450:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-cmv6-9f3j-jvqp | IBM Spectrum Protect 7.1 and 8.1 is affected by a password exposure vulnerability caused by insecure file permissions. IBM X-Force ID: 148872. | [] | null | null | 5.5 | null |
|
CVE-2014-3134 | Cross-site scripting (XSS) vulnerability in the InfoView application in SAP BusinessObjects allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:sap:businessobjects:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-25207 | A cross-site request forgery (CSRF) vulnerability in Jenkins Chef Sinatra Plugin 1.20 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse an XML response. | [
"cpe:2.3:a:jenkins:chef_sinatra:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 6.8 |
|
PYSEC-2014-2 | null | The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users. | [] | null | null | null | null |
PYSEC-2023-230 | null | Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cached device information of remote users can be queried from Synapse. This can be used to enumerate the remote users known to a homeserver. System administrators are encouraged to upgrade to Synapse 1.95.1 or 1.96.0rc1 to receive a patch. As a workaround, the `federation_domain_whitelist` can be used to limit federation traffic with a homeserver.
| [] | null | 5.3 | null | null |
CVE-2013-5351 | Heap-based buffer overflow in IrfanView before 4.37 allows remote attackers to execute arbitrary code via the LZW code stream in a GIF file. | [
"cpe:2.3:a:irfanview:irfanview:*:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.75:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.80:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.85:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.90:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.95:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.97:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.98:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.98a:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:1.99:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.05:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.07:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.35:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.37:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.52:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.55:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.62:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.63:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.65:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.66:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.68:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.80:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.82:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.83:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.85:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.92:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.95:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.97:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:2.98:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.05:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.07:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.33:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.35:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.36:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.50:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.70:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.75:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.80:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.85:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.90:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.91:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.92:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.95:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.97:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.98:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:3.99:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.35:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2017-6775 | A vulnerability in the CLI of Cisco ASR 5000 Series Aggregated Services Routers running the Cisco StarOS operating system could allow an authenticated, local attacker to elevate their privileges to admin-level privileges. The vulnerability is due to incorrect permissions that are given to a set of users. An attacker could exploit this vulnerability by logging in to the shell of an affected device and elevating their privileges by modifying environment variables. An exploit could allow the attacker to gain admin-level privileges and take control of the affected device. Cisco Bug IDs: CSCvd47741. Known Affected Releases: 21.0.v0.65839. | [
"cpe:2.3:a:cisco:asr_5000_software:21.0.v0.65839:*:*:*:*:*:*:*"
] | null | null | 5.7 | 4.6 |
|
RHSA-2017:0864 | Red Hat Security Advisory: Red Hat Enterprise Linux 7.1 Extended Update Support Retirement Notice | This is the final notification for the retirement of Red Hat Enterprise Linux 7.1 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.1. | [
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | null | null |
GHSA-7fgm-h923-mw4g | The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (memory corruption) via a crafted RAR file that is mishandled during decompression. | [] | null | 5.5 | null | null |
|
GHSA-p5jh-8rxp-wqjj | XSS vulnerability in Jenkins Build Failure Analyzer Plugin | Jenkins Build Failure Analyzer Plugin 1.27.0 and earlier does not escape matching text in a form validation response, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to provide console output for builds used to test build log indications.Build Failure Analyzer Plugin 1.27.1 escapes matching text in the affected form validation response. | [] | null | 8 | null | null |
CVE-2023-6824 | WP Customer Area < 8.2.1 - Subscriber+ Account Address Leak | The WP Customer Area WordPress plugin before 8.2.1 does not properly validates user capabilities in some of its AJAX actions, allowing any users to retrieve other user's account address. | [
"cpe:2.3:a:marvinlabs:wp_customer_area:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-m974-647v-whv7 | Signature bypass via multiple root elements | ImpactA remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered.PatchesUsers should upgrade to passport-saml 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before v4.0.0-beta.5.WorkaroundsDisable SAML authentication.References_Are there any links users can visit to find out more?_For more informationIf you have any questions or comments about this advisory:Open a discussion in the [node-saml repo](https://github.com/node-saml/node-saml/discussions)CreditsFelix Wilhelm of Google Project Zero | [] | null | 8.1 | null | null |
GHSA-7p8p-77rq-jh4w | Use of uninitialized resource in Windows DWM Core Library allows an authorized attacker to disclose information locally. | [] | null | 5.5 | null | null |
|
CVE-2020-27780 | A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate. | [
"cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2022-31596 | Under certain conditions, an attacker authenticated as a CMS administrator and with high privileges access to the Network in SAP BusinessObjects Business Intelligence Platform (Monitoring DB) - version 430, can access BOE Monitoring database to retrieve and modify (non-personal) system data which would otherwise be restricted. Also, a potential attack could be used to leave the CMS's scope and impact the database.
A successful attack could have a low impact on confidentiality, a high impact on integrity, and a low impact on availability.
| [
"cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:*"
] | null | 6 | null | null |
|
CVE-2020-22655 | In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to persistently to writing unauthorized image. | [
"cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-jhv5-8vgm-f4p5 | Doufox v0.0.4 was discovered to contain a remote code execution (RCE) vulnerability via the edit file page. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. | [] | null | 9.8 | null | null |
|
CVE-2019-13046 | linker/linker.c in ToaruOS through 1.10.9 has insecure LD_LIBRARY_PATH handling in setuid applications. | [
"cpe:2.3:o:toaruos_project:toaruos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-vhxv-fg4m-p2w8 | Some CORS middleware allow untrusted origins | ImpactSome CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question.For example, specifying origin patterns `https://foo.com` and `https://bar.com` (in that order) would yield a middleware that would incorrectly allow untrusted origin `https://barfoo.com`.PatchesPatched in v0.1.3.WorkaroundsNone. | [] | null | 9.3 | null | null |
GHSA-9r82-ff34-6w3x | A vulnerability in the API of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to perform a horizontal privilege escalation attack on an affected system.This vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by submitting crafted API requests to an affected system to execute an insecure direct object reference attack. A successful exploit could allow the attacker to access specific data that is associated with different users on the affected system. | [] | null | 4.3 | null | null |
|
CVE-2005-2963 | The mod_auth_shadow module 1.0 through 1.5 and 2.0 for Apache with AuthShadow enabled uses shadow authentication for all locations that use the require group directive, even when other authentication mechanisms are specified, which might allow remote authenticated users to bypass security restrictions. | [
"cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_auth_shadow:mod_auth_shadow:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-7603 | Search Autocomplete | In Drupal's 3rd party module search auto complete prior to versions 7.x-4.8 there is a Cross Site Scripting vulnerability. This Search Autocomplete module enables you to autocomplete textfield using data from your website (nodes, comments, etc.). The module doesn't sufficiently filter user-entered text among the autocompletion items leading to a Cross Site Scripting (XSS) vulnerability. This vulnerability can be exploited by any user allowed to create one of the autocompletion item, for instance, nodes, users, comments. | [
"cpe:2.3:a:search_autocomplete_project:search_autocomplete:*:*:*:*:*:drupal:*:*"
] | null | null | 6.1 | 4.3 |
CVE-2014-6607 | M/Monit 3.3.2 and earlier does not verify the original password before changing passwords, which allows remote attackers to change the password of other users and gain privileges via the fullname and password parameters, a different vulnerability than CVE-2014-6409. | [
"cpe:2.3:a:mmonit:m\\/monit:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2012-3838 | Gekko before 1.2.0 allows remote attackers to obtain the installation path via a direct request to (1) admin/templates/babygekko/index.php or (2) templates/html5demo/index.php. | [
"cpe:2.3:a:babygekko:baby_gekko:*:*:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:0.98:alpha:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:0.99:beta:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:babygekko:baby_gekko:1.1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-m58j-4g2v-78p2 | Buffer overflow in the Sierra VMD decoder in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9 and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VMD file, related to corrupted streams. | [] | null | null | null | null |
|
CVE-2010-4312 | The default configuration of Apache Tomcat 6.x does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to hijack a session via script access to a cookie. | [
"cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2010-4924 | PHP remote file inclusion vulnerability in logic/controller.class.php in clearBudget 0.9.8 allows remote attackers to execute arbitrary PHP code via a URL in the actionPath parameter. NOTE: this issue has been disputed by a reliable third party | [
"cpe:2.3:a:clearbudget:clearbudget:0.9.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-f9r6-5mf9-rjq7 | Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function localMsg. | [] | null | 9.8 | null | null |
|
CVE-2022-21519 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
GHSA-w256-hx99-6r3x | A Security Bypass vulnerability exists in the phpCAS 1.2.2 library from the jasig project due to the way proxying of services are managed. | [] | null | null | null | null |
|
GHSA-j287-529v-pjr9 | Once logged in to ProGauge MAGLINK LX4 CONSOLE, a valid user can change their privileges to administrator. | [] | 8.7 | 8.8 | null | null |
|
CVE-2024-30593 | Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability located in the deviceName parameter of the formSetDeviceName function. | [
"cpe:2.3:a:tenda:fh1202:v1.2.0.14:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-hj9g-7v26-7xjx | Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image. | [] | null | null | null | null |
|
GHSA-8x4w-7h9g-pg2q | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
GHSA-h7vf-2gmx-cr9w | The Icon Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-7qgw-j3rw-j7v9 | Multiple direct static code injection vulnerabilities in MyCMS 0.9.8 and earlier allow remote attackers to inject arbitrary PHP code into (1) a _score.txt file via the score parameter, or (2) a _setby.txt file via a login cookie, which is then included by games.php. NOTE: programs that use games.php might include (a) snakep.php, (b) tetrisp.php, and possibly other site-specific files. | [] | null | null | null | null |
|
GHSA-vxr3-fcvj-wxgq | In Nagios XI 5.6.9, XSS exists via the nocscreenapi.php host, hostgroup, or servicegroup parameter, or the schedulereport.php hour or frequency parameter. Any authenticated user can attack the admin user. | [] | null | null | null | null |
|
GHSA-fm6w-v8h2-8q9w | Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBK20 before 2.3.5.26, RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK40 before 2.3.5.30, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK50 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10. | [] | null | null | null | null |
|
GHSA-jcg4-vmx5-vfm2 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in markkinchin Beds24 Online Booking allows Stored XSS. This issue affects Beds24 Online Booking: from n/a through 2.0.26. | [] | null | 6.5 | null | null |
|
CVE-2000-0660 | The WDaemon web server for WorldClient 2.1 allows remote attackers to read arbitrary files via a .. (dot dot) attack. | [
"cpe:2.3:a:alt-n:worldclient:2.1:*:standard:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-64cw-wmc5-j274 | The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. | [] | null | null | 5.5 | null |
|
GHSA-5g7f-65fx-ww2j | An issue was discovered in Foxit Reader and PhantomPDF before 9.7.2. It has a use-after-free because of JavaScript execution after a deletion or close operation. | [] | null | null | null | null |
|
PYSEC-2018-52 | null | A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage. | [] | null | null | null | null |
GHSA-hjcr-mhf6-4rv6 | Kibana versions prior to 6.0.1 and 5.6.5 had a cross-site scripting (XSS) vulnerability via URL fields that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users. | [] | null | null | 6.1 | null |
|
CVE-2009-0122 | hplip.postinst in HP Linux Imaging and Printing (HPLIP) 2.7.7 and 2.8.2 on Ubuntu allows local users to change the ownership of arbitrary files via unspecified manipulations in advance of an HPLIP installation or upgrade by an administrator, related to the product's attempt to correct the ownership of its configuration files within home directories. | [
"cpe:2.3:a:hp:hplip:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:hplip:2.8.2:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-8x2p-m64p-q55q | A vulnerability has been found in wp-file-upload Plugin up to 2.4.3 on WordPress and classified as problematic. Affected by this vulnerability is the function wfu_ajax_action_callback of the file lib/wfu_ajaxactions.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.4.4 is able to address this issue. The identifier of the patch is c846327df030a0a97da036a2f07c769ab9284ddb. It is recommended to upgrade the affected component. The identifier VDB-258781 was assigned to this vulnerability. | [] | null | 3.5 | null | null |
|
GHSA-g7q5-7w4c-7v63 | Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007). | [] | null | null | null | null |
|
GHSA-98vm-qgxx-5rjm | In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds write in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855. | [] | null | 8.1 | null | null |
|
GHSA-w5cv-2gw6-jxhf | IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation. | [] | null | null | null | null |
|
GHSA-vj3m-m56w-wwj4 | A vulnerability classified as problematic has been found in WebFactory Under Construction Plugin. This affects an unknown part of the component Plugin Setting Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212661 was assigned to this vulnerability. | [] | null | 4.8 | null | null |
|
CVE-2014-7849 | The Role Based Access Control (RBAC) implementation in JBoss Enterprise Application Platform (EAP) 6.2.0 through 6.3.2 does not properly verify authorization conditions, which allows remote authenticated users to add, modify, and undefine otherwise restricted attributes by leveraging the Maintainer role. | [
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.3.2:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-6gpx-5j98-8jjg | The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call. | [] | null | null | 9.8 | null |
|
CVE-2007-1286 | Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-gv2x-7259-82cc | Multiple cross-site scripting (XSS) vulnerabilities in pm.php in DeluxeBB 1.07 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) subject or (2) to parameters. | [] | null | null | null | null |
|
CVE-2023-27600 | OpenSIPS has vulnerability in the codec_delete_XX() functions | OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, OpenSIPS crashes when a malformed SDP body is received and is processed by the `delete_sdp_line` function in the sipmsgops module. This issue can be reproduced by calling the function with an SDP body that does not terminate by a line feed (i.e. `\n`).
The vulnerability was found while performing black-box fuzzing against an OpenSIPS server running a configuration that made use of the functions `codec_delete_except_re` and `codec_delete_re`. The same issue was also discovered while performing coverage guided fuzzing on the function `codec_delete_except_re`. The crash happens because the function `delete_sdp_line` expects that an SDP line is terminated by a line feed (`\n`).
By abusing this vulnerability, an attacker is able to crash the server. It affects configurations containing functions that rely on the affected code, such as the function `codec_delete_except_re`. Due to the sanity check that is performed in the `del_lump` function, exploitation of this issue will generate an `abort` in the lumps processing function, resulting in a Denial of Service. This issue is patched in versions 3.1.7 and 3.2.4. | [
"cpe:2.3:a:opensips:opensips:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-jw4f-pgc8-4877 | Sonatype Nexus Repository Manager 3.x through 3.35.0 allows attackers to access the SSL Certificates Loading function via a low-privileged account. | [] | null | 4.3 | null | null |
|
GHSA-4wwx-hr93-hq4g | An issue was discovered in YxtCMF 3.1. RbacController.class.php has CSRF, as demonstrated by modifying an administrator account via index.php/admin/user/add_post.html. | [] | null | null | 8.8 | null |
|
CVE-2002-1498 | Directory traversal vulnerability in SWServer 2.2 and earlier allows remote attackers to read arbitrary files via a URL containing .. sequences with "/" or "\" characters. | [
"cpe:2.3:a:trevor_lee:swserver:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vmwq-gw9g-wqfq | In AT_SKIP_REST of bta_hf_client_at.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure in the Bluetooth stack with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220732646 | [] | null | 7.5 | null | null |
|
GHSA-2rhg-qq9v-fjp8 | A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious input to trigger this vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-fxw9-g6g5-mfqx | Improper neutralization of input during web page generation vulnerability in MagnusSolution MagnusBilling login logging allows unauthenticated users to store HTML content in the viewable log component accessible at /mbilling/index.php/logUsers/read" cross-site scripting This vulnerability is associated with program files protected/components/MagnusLog.Php.This issue affects MagnusBilling: through 7.3.0. | [] | null | 8.2 | null | null |
|
RHSA-2024:10813 | Red Hat Security Advisory: OpenShift Container Platform 4.13.54 bug fix and security update | golang-github-gin-gonic-gin: Improper Input Validation golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) openshift-console: OAuth2 insufficient state parameter entropy QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8 | 7.5 | null |
GHSA-2gp6-v2j8-wm92 | A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe. | [] | null | 7.8 | null | null |
|
CVE-2022-26792 | Windows Print Spooler Elevation of Privilege Vulnerability | Windows Print Spooler Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2022-23377 | Archeevo below 5.0 is affected by local file inclusion through file=~/web.config to allow an attacker to retrieve local files. | [
"cpe:2.3:a:keep:archeevo:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2022-29841 | OS Command Injection vulnerability in Western Digital My Cloud devices | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that was caused by a command that read files from a privileged location and created a system command without sanitizing the read data. This command could be triggered by an attacker remotely to cause code execution and gain a reverse shell in Western Digital My Cloud OS 5 devices.This issue affects My Cloud OS 5: before 5.26.119.
| [
"cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_mirror_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*"
] | null | 8 | null | null |
RHSA-2022:0512 | Red Hat Security Advisory: firefox security update | Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
GHSA-rx9x-73jj-929p | Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name. | [] | null | null | null | null |
|
CVE-2014-6025 | The Chartboost library before 2.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:chartboost:chartboost_library:2.0.2:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2016-3232 | The Virtual PCI (VPCI) virtual service provider in Microsoft Windows Server 2012 Gold and R2 allows local users to obtain sensitive information from uninitialized memory locations via a crafted application, aka "Windows Virtual PCI Information Disclosure Vulnerability." | [
"cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*"
] | null | null | 5 | 2.1 |
|
CVE-2015-1963 | Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2015-1924, CVE-2015-1925, CVE-2015-1929, CVE-2015-1930, CVE-2015-1948, CVE-2015-1953, CVE-2015-1954, CVE-2015-1962, CVE-2015-1964, and CVE-2015-1965. | [
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2008-0888 | The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data. | [
"cpe:2.3:a:info-zip:unzip:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2019-11271 | Bosh Deployment logs leak sensitive information | Cloud Foundry BOSH 270.x versions prior to v270.1.1, contain a BOSH Director that does not properly redact credentials when configured to use a MySQL database. A local authenticated malicious user may read any credentials that are contained in a BOSH manifest. | [
"cpe:2.3:a:cloud_foundry:bosh:*:*:*:*:*:*:*:*"
] | null | null | 6 | null |
CVE-2024-8554 | SourceCodester Clinics Patient Management System users.php cross site scripting | A vulnerability was found in SourceCodester Clinics Patient Management System 2.0 and classified as problematic. This issue affects some unknown processing of the file /users.php. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:oretnom23:clinic\\'s_patient_management_system:2.0:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 |
CVE-2025-5907 | TOTOLINK EX1200T HTTP POST Request formFilter buffer overflow | A vulnerability classified as critical was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This vulnerability affects unknown code of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 8.7 | 8.8 | 8.8 | 9 |
GHSA-85qx-mfpj-cvj4 | The Quiz Maker Business, Developer, and Agency plugins for WordPress is vulnerable to SQL Injection via the ‘id’ parameter in all versions up to, and including, 8.8.0 (Business), up to, and including, 21.8.0 (Developer), and up to, and including, 31.8.0 (Agency) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 7.5 | null | null |
|
CVE-2019-17564 | Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions. | [
"cpe:2.3:a:apache:dubbo:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 6.8 |
|
CVE-2018-19039 | Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary files by leveraging Editor or Admin permissions. | [
"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid_webscale_nas_bridge:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-674g-c7wh-2qvj | Multiple cross-site scripting (XSS) vulnerabilities in index.php in Contenido 4.8.4 allow remote attackers to inject arbitrary web script or HTML via the (1) contenido, (2) Belang, and (3) username parameters. | [] | null | null | null | null |
|
CVE-2020-14317 | It was found that the issue for security flaw CVE-2019-3805 appeared again in a further version of JBoss Enterprise Application Platform - Continuous Delivery (EAP-CD) introducing regression. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root. | [
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:redhat:wildfly:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
CVE-2009-0451 | SQL injection vulnerability in Skalfa SkaLinks 1.5 allows remote attackers to execute arbitrary SQL commands via the Admin name field to the default URI under admin/. | [
"cpe:2.3:a:skalinks:skalinks:1.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-vv46-jc2q-qcxw | A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to incorrect input validation in the NX-API feature. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS request to an internal service on an affected device that has the NX-API feature enabled. A successful exploit could allow the attacker to cause a buffer overflow and execute arbitrary code as root. Note: The NX-API feature is disabled by default. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.1(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(8). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(2)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 7.3(3)D1(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5). | [] | null | 7.8 | null | null |
|
CVE-2024-54273 | WordPress Mail Picker plugin <= 1.0.14 - PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in PickPlugins Mail Picker allows Object Injection.This issue affects Mail Picker: from n/a through 1.0.14. | [] | null | 9.8 | null | null |
CVE-2013-4221 | The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML. | [
"cpe:2.3:a:restlet:restlet:*:*:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc5:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc6:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2017:0333 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 5.5 | null |
RHSA-2022:1305 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: OpenPGP revocation information was ignored Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 6.1 | null |
GHSA-pj2c-gg72-jw8v | Apple Online Store Kit in Apple OS X before 10.11 improperly validates iCloud keychain item ACLs, which allows attackers to obtain access to keychain items via a crafted app. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.