id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2018-6550 | Monstra CMS through 3.0.4 has XSS in the title function in plugins/box/pages/pages.plugin.php via a page title to admin/index.php. | [
"cpe:2.3:a:monstra:monstra:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
CVE-2014-5332 | Race condition in NVMap in NVIDIA Tegra Linux Kernel 3.10 allows local users to gain privileges via a crafted NVMAP_IOC_CREATE IOCTL call, which triggers a use-after-free error, as demonstrated by using a race condition to escape the Chrome sandbox. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-5c85-65r2-4x5q | An issue was discovered in PHPSHE 1.7. admin.php?mod=db&act=del allows remote attackers to delete arbitrary files via directory traversal sequences in the dbname parameter. This can be leveraged to reload the product by deleting install.lock. | [] | null | null | 7.5 | null |
|
GHSA-93fx-qmm2-963p | The Houzez CRM plugin for WordPress is vulnerable to time-based SQL Injection via the notes ‘belong_to’ parameter in all versions up to, and including, 1.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Custom-level (seller) access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 8.8 | null | null |
|
GHSA-rfh7-48pv-qj88 | Missing Authorization vulnerability in wordpresschef Salon Booking Pro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Salon Booking Pro: from n/a through 10.10.2. | [] | null | 4.3 | null | null |
|
CVE-2013-5028 | SQL injection vulnerability in IT/hardware-list.dll in Kwoksys Kwok Information Server before 2.8.5 allows remote authenticated users to execute arbitrary SQL commands via the (1) hardwareType, (2) hardwareStatus, or (3) hardwareLocation parameter in a search command. | [
"cpe:2.3:a:kwoksys:information_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kwoksys:information_server:2.8.3:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2017-5614 | Open redirect vulnerability in cgiemail and cgiecho allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the (1) success or (2) failure parameter. | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
CVE-2022-25249 | PTC Axeda agent and Axeda Desktop Server Path Traversal | When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) (disregarding Axeda agent v6.9.2 and v6.9.3) is vulnerable to directory traversal, which could allow a remote unauthenticated attacker to obtain file system read access via web server.. | [
"cpe:2.3:a:ptc:axeda_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ptc:axeda_desktop_server:*:*:*:*:*:windows:*:*"
] | null | 7.5 | null | null |
GHSA-cf7h-r4qx-2r45 | Dell PowerProtect DD, versions prior to 8.1.0.0, 7.13.1.10, 7.10.1.40, and 7.7.5.50, contains an access control vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to escalation of privilege on the application. | [] | null | 6.5 | null | null |
|
RHSA-2019:2974 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 security update | wildfly-security-manager: security manager authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 7.5 | null |
GHSA-m87c-pc83-wrfv | In the Linux kernel, the following vulnerability has been resolved:be2net: fix potential memory leak in be_xmit()The be_xmit() returns NETDEV_TX_OK without freeing skb
in case of be_xmit_enqueue() fails, add dev_kfree_skb_any() to fix it. | [] | null | 5.5 | null | null |
|
CVE-2024-42284 | tipc: Return non-zero value from tipc_udp_addr2str() on error | In the Linux kernel, the following vulnerability has been resolved:
tipc: Return non-zero value from tipc_udp_addr2str() on error
tipc_udp_addr2str() should return non-zero value if the UDP media
address is invalid. Otherwise, a buffer overflow access can occur in
tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP
media address. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-87fg-9x5w-j3rm | MainWP Dashboard SQL Command Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MainWP MainWP Dashboard – WordPress Manager for Multiple Websites Maintenance.This issue affects MainWP Dashboard – WordPress Manager for Multiple Websites Maintenance: from n/a through 4.4.3.3. | [] | null | 7.6 | null | null |
CVE-2014-3617 | The forum_print_latest_discussions function in mod/forum/lib.php in Moodle through 2.4.11, 2.5.x before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2 allows remote authenticated users to bypass the individual answer-posting requirement without the mod/forum:viewqandawithoutposting capability, and discover an author's username, by leveraging the student role and visiting a Q&A forum. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-ph43-q49h-r73x | Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no icmp check link WORD destination WORD interval <1-255> retries <1-255> description (WORD|null)' command template. | [] | null | 9.8 | null | null |
|
GHSA-hrm3-4qxx-v4qm | A vulnerability classified as problematic has been found in FFmpeg 2.0. This affects the function decode_pulses. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. | [] | null | 5.5 | null | null |
|
GHSA-75xq-8h5m-hrpv | "IBM InfoSphere Information Server 11.7 could allow an authenticated user to access information restricted to users with elevated privileges due to improper access controls. IBM X-Force ID: 224427." | [] | null | 6.5 | null | null |
|
ICSA-20-308-01 | WAGO Series 750-88x and 750-352 (Update A) | An attacker can execute a denial-of-service attack by sending a series of maliciously constructed packets to HTTP(S) Ports 80/443, which may cause the device to crash.CVE-2020-12516 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 7.5 | null |
GHSA-ggp5-fjp8-9cq2 | An issue was discovered on Samsung mobile devices with O(8.x) software. FactoryCamera does not properly restrict runtime permissions. The Samsung ID is SVE-2020-17270 (July 2020). | [] | null | null | null | null |
|
GHSA-qmpx-7mr8-9whr | A user with a compromised configuration can start an unsigned binary as a service. | [] | null | 6.5 | null | null |
|
CVE-2019-19602 | fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.4 |
|
GHSA-wv83-gr92-97gp | A cross-site scripting (XSS) vulnerability in /admin/add-fee.php of Train Scheduler App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cmddept parameter. | [] | null | 6.1 | null | null |
|
CVE-2008-2047 | Multiple SQL injection vulnerabilities in Angelo-Emlak 1.0 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) hpz/profil.asp and (2) hpz/prodetail.asp. | [
"cpe:2.3:a:aspindir:angelo-emlak:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-49875 | bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE | In the Linux kernel, the following vulnerability has been resolved:
bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE
When using bpftool to pin {PROG, MAP, LINK} without FILE,
segmentation fault will occur. The reson is that the lack
of FILE will cause strlen to trigger NULL pointer dereference.
The corresponding stacktrace is shown below:
do_pin
do_pin_any
do_pin_fd
mount_bpffs_for_pin
strlen(name) <- NULL pointer dereference
Fix it by adding validation to the common process. | [] | null | 5.5 | null | null |
GHSA-8hgg-pmrm-w85w | Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allows L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842. | [] | null | null | null | null |
|
GHSA-95g7-fcwr-c2p8 | doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/php/renamefile.php. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information or make the server unserviceable. | [] | null | null | 8.2 | null |
|
GHSA-46xq-3hp8-fm2c | Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors related to improper length calculation and the (1) STSC, (2) STSZ, and (3) STCO atoms. | [] | null | null | null | null |
|
CVE-2009-4588 | Heap-based buffer overflow in the WindsPlayerIE.View.1 ActiveX control in WindsPly.ocx 3.5.0.0 Beta, 3.0.0.5, and earlier in AwingSoft Awakening Web3D Player and Winds3D Viewer allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long SceneUrl property value, a different vulnerability than CVE-2009-2386. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:awingsoft:awakening_winds3d_player:3.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:awingsoft:awakening_winds3d_player:3.5.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:awingsoft:awakening_winds3d_viewer:3.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:awingsoft:awakening_winds3d_viewer:3.5.0.0:beta:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-98px-6486-j7qc | Synapse has URL deny list bypass via oEmbed and image URLs when generating previews | ImpactA discovered oEmbed or image URL can bypass the `url_preview_url_blacklist` setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the `url_preview_ip_range_blacklist` setting (by default this only allows public IPs) and by the limited information returned to the client:For discovered oEmbed URLs, any non-JSON response or a JSON response which includes non-oEmbed information is discarded.For discovered image URLs, any non-image response is discarded.Systems which have URL preview disabled (via the `url_preview_enabled` setting) or have not configured a `url_preview_url_blacklist` are not affected.Because of the uncommon configuration required, the limited information a malicious user, and the amount of guesses/time the attack would need; the severity is rated as low.PatchesThe issue is fixed by #15601.WorkaroundsThe default configuration of the `url_preview_ip_range_blacklist` should protect against requests being made to internal infrastructure, URL previews of public URLs is expected.Alternately URL previews could be disabled using the `url_preview_enabled` setting. | [] | 5.1 | 3.5 | null | null |
GHSA-g3jh-jprp-x488 | A vulnerability classified as critical was found in D-Link DIR-619L B1 2.06. Affected by this vulnerability is the function formSetDDNS of the file /goform/formSetDDNS. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 8.7 | 8.8 | null | null |
|
CVE-2024-5515 | SourceCodester Stock Management System createBrand.php sql injection | A vulnerability was found in SourceCodester Stock Management System 1.0. It has been classified as critical. Affected is an unknown function of the file createBrand.php. The manipulation of the argument brandName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266586 is the identifier assigned to this vulnerability. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2021-30820 | A logic issue was addressed with improved state management. This issue is fixed in iOS 14.8 and iPadOS 14.8. A remote attacker may be able to cause arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-47754 | media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning | In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning
Fix a smatch static checker warning on vdec_h264_req_multi_if.c.
Which leads to a kernel crash when fb is NULL. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-g8jc-mm3c-cwhj | Malicious Package in reques | All versions of `reques` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.RecommendationRemove the package from your dependencies and always ensure package names are typed correctly upon installation. | [] | null | 9.8 | null | null |
RHSA-2018:1688 | Red Hat Security Advisory: org.ovirt.engine-root security update | hw: cpu: speculative store bypass | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | 5.6 | null |
RHSA-2013:1155 | Red Hat Security Advisory: rhev 3.2.2 - vdsm security and bug fix update | vdsm: incomplete fix for CVE-2013-0167 issue | [
"cpe:/a:redhat:enterprise_linux:6::hypervisor",
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
GHSA-mrw3-j4cq-8qgp | The LadiApp plugn for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the init_endpoint() function hooked via 'init' in versions up to, and including, 4.3. This makes it possible for unauthenticated attackers to modify a variety of settings. An attacker can directly modify the 'ladipage_key' which enables them to create new posts on the website and inject malicious web scripts. | [] | null | 5.3 | null | null |
|
CVE-2007-6031 | Unspecified vulnerability in VanDyke VShell 3.0.1 allows remote attackers to cause a denial of service via unspecified vectors. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine. | [
"cpe:2.3:a:van_dyke_technologies:vshell:3.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-fwfm-v4vv-wgj6 | By utilizing software-defined radios and a custom low-latency processing pipeline, RF signals with spoofed location data can be transmitted to aircraft targets. This can lead to the appearance of fake aircraft on displays and potentially trigger undesired Resolution Advisories (RAs). | [] | 6 | null | null | null |
|
GHSA-468w-rc5f-76wx | Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26307 - LibreOffice | [] | null | 8.8 | null | null |
|
CVE-2021-41867 | An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature. | [
"cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2024-33852 | A SQL Injection vulnerability exists in the Downtime component in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23. | [
"cpe:2.3:a:centreon:centreon_web:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
GHSA-p443-fjqf-h82p | Privilege Escalation vulnerability in McAfee MVISION Endpoint prior to 20.9 Update allows local users to access files which the user otherwise would not have access to via manipulating symbolic links to redirect McAfee file operations to an unintended file. | [] | null | null | null | null |
|
GHSA-q926-pj8q-72f7 | Cross-Site Request Forgery (CSRF) vulnerability in davidfcarr My Marginalia allows Stored XSS. This issue affects My Marginalia: from n/a through 1.0.6. | [] | null | 7.1 | null | null |
|
GHSA-9j99-q238-v99m | Helmet Store Showroom Site v1.0 is vulnerable to SQL Injection via /hss/admin/?page=products/manage_product&id=. | [] | null | 7.2 | null | null |
|
GHSA-49xg-7g43-xhgm | A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Results Header field. | [] | null | 4.8 | null | null |
|
GHSA-3p44-pgj6-cf97 | A vulnerability in the windows installer of Google Earth Pro versions prior to 7.3.3 allows an attacker using DLL hijacking to insert malicious local files to execute unauthenticated remote code on the targeted system. | [] | null | 7.8 | null | null |
|
CVE-2023-53020 | l2tp: close all race conditions in l2tp_tunnel_register() | In the Linux kernel, the following vulnerability has been resolved:
l2tp: close all race conditions in l2tp_tunnel_register()
The code in l2tp_tunnel_register() is racy in several ways:
1. It modifies the tunnel socket _after_ publishing it.
2. It calls setup_udp_tunnel_sock() on an existing socket without
locking.
3. It changes sock lock class on fly, which triggers many syzbot
reports.
This patch amends all of them by moving socket initialization code
before publishing and under sock lock. As suggested by Jakub, the
l2tp lockdep class is not necessary as we can just switch to
bh_lock_sock_nested(). | [] | null | 4.7 | null | null |
CVE-2021-4067 | Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
RHSA-2021:0476 | Red Hat Security Advisory: dotnet5.0 security and bugfix update | dotnet: certificate chain building recursion Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
CVE-2007-1105 | PHP remote file inclusion vulnerability in functions.php in Extreme phpBB (aka phpBB Extreme) 3.0.1 allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [
"cpe:2.3:a:extreme_phpbb:extreme_phpbb:3.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-qgfr-27qf-f323 | In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499 | [] | null | 7.8 | null | null |
|
GHSA-886j-gj8r-846c | 04WebServer 1.42 does not adequately filter data that is written to log files, which could allow remote attackers to inject carriage return characters into the log file and spoof log entries. | [] | null | null | null | null |
|
GHSA-7769-fqm3-9xc6 | OpenLDAP in Apple Mac OS X 10.4 up to 10.4.6 allows remote attackers to cause a denial of service (crash) via an invalid LDAP request that triggers an assert error. | [] | null | null | null | null |
|
GHSA-xfp5-84xh-73gv | Vulnerability in the Oracle FLEXCUBE Core Banking component of Oracle Financial Services Applications (subcomponent: Core). Supported versions that are affected are 5.1.0, 5.2.0 and 11.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Core Banking. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Core Banking accessible data. CVSS v3.0 Base Score 4.3 (Confidentiality impacts). | [] | null | null | 4.3 | null |
|
CVE-2007-2431 | Dynamic variable evaluation vulnerability in shared/config/tce_config.php in TCExam 4.0.011 and earlier allows remote attackers to conduct cross-site scripting (XSS) and possibly other attacks by modifying critical variables such as $_SERVER, as demonstrated by injecting web script via the _SERVER[SCRIPT_NAME] parameter. | [
"cpe:2.3:a:tecnick.com:tcexam:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-24846 | Ni WooCommerce Custom Order Status < 1.9.7 - Subscriber+ SQL Injection | The get_query() function of the Ni WooCommerce Custom Order Status WordPress plugin before 1.9.7, used by the niwoocos_ajax AJAX action, available to all authenticated users, does not properly sanitise the sort parameter before using it in a SQL statement, leading to an SQL injection, exploitable by any authenticated users, such as subscriber | [
"cpe:2.3:a:ni_woocommerce_custom_order_status_project:ni_woocommerce_custom_order_status:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 |
GHSA-wxp5-rj6r-q9ff | A missing authority check in SAP CRM, versions - 700, 701, 702, 712, 713, 714, could be leveraged by an attacker with high privileges to compromise confidentiality, integrity, or availability of the system. | [] | null | null | null | null |
|
CVE-2019-1167 | A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'. | [
"cpe:2.3:a:microsoft:powershell_core:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powershell_core:6.2:*:*:*:*:*:*:*"
] | null | null | 4.1 | 1.9 |
|
GHSA-p5c4-8m5x-vh8p | An Improper access control vulnerability in StRetailModeReceiver in Wear OS 3.0 prior to Firmware update MAR-2022 Release allows untrusted applications to reset default app settings without a proper permission | [] | null | 3.3 | null | null |
|
GHSA-4jgr-5qw5-7m4m | Cross-site scripting (XSS) vulnerability in the ajaxswing webui in the Management Console server in the management server in Symantec Critical System Protection (SCSP) 5.2.9 through MP6 and Symantec Data Center Security: Server Advanced (SDCS:SA) 6.0.x through 6.0 MP1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
CVE-2020-2171 | Jenkins RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | [
"cpe:2.3:a:jenkins:rapiddeploy:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2023-23519 | A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing an image may lead to a denial-of-service. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2021-34534 | Windows MSHTML Platform Remote Code Execution Vulnerability | Windows MSHTML Platform Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2114:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1734:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1165:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4583:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
CVE-2023-21717 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | Microsoft SharePoint Server Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2007-1948 | Buffer overflow in IrfanView 3.99 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via the (1) xoffset or (2) yoffset RLE command, or (3) large non-RLE encoded blocks in a crafted BMP image, as demonstrated by rle8of3.bmp and rle8of4.bmp. | [
"cpe:2.3:a:irfanview:irfanview:3.99:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-j386-3444-qgwg | Trix allows Cross-site Scripting via `javascript:` url in a link | The Trix editor, versions prior to 2.1.11, is vulnerable to XSS when pasting malicious code in the link field.ImpactAn attacker could trick the user to copy&paste a malicious `javascript:` URL as a link that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed.See https://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8PatchesUpdate Recommendation: Users should upgrade to Trix editor version 2.1.12 or later.WorkaroundsThis is not really a workaround but something that should be considered in addition to upgrading to the patched version. If affected users can disallow browsers that don't support a Content Security Policy, then this would be an effective workaround for this and all XSS vulnerabilities. Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin are executed, and explicitly prohibit inline scripts using script-src-elem.Referenceshttps://gist.github.com/th4s1s/3921fd9c3e324ad9a3e0d846166e3eb8CreditsThis vulnerability was reported by Hackerone researcher https://hackerone.com/lio346?type=user | [] | null | 5.3 | null | null |
RHSA-2015:0377 | Red Hat Security Advisory: libreoffice security, bug fix, and enhancement update | libreoffice: VBA macros executed unconditionally openoffice: Arbitrary file disclosure via crafted OLE objects libreoffice: Use-After-Free in socket manager of Impress Remote | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
GHSA-9245-jr52-v2xm | Car Rental System v1.0 contains an arbitrary file upload vulnerability via the Add Car component which allows attackers to upload a webshell and execute arbitrary code. | [] | null | 8.8 | null | null |
|
GHSA-h897-v8rp-9crr | Missing Authorization vulnerability in CoCart Headless, LLC CoCart – Headless ecommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CoCart – Headless ecommerce: from n/a through 3.11.2. | [] | null | 5.3 | null | null |
|
GHSA-hp4g-3v9q-m2cq | SQL injection vulnerability in index.php in Zenphoto 1.2.5 allows remote attackers to execute arbitrary SQL commands via the title parameter in a news action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2019-8613 | A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, tvOS 12.3, watchOS 5.2.1. A remote attacker may be able to cause arbitrary code execution. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-c8qp-6cf2-vx85 | Unspecified vulnerability in ImageIO in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote user-assisted attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RAW image that triggers memory corruption. | [] | null | null | null | null |
|
GHSA-xmxg-28xr-rp8x | drivers/usb/core/config.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor. | [] | null | null | 6.6 | null |
|
GHSA-rhcm-mpjw-m6hf | A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service. | [] | null | 7.1 | null | null |
|
RHSA-2018:2733 | Red Hat Security Advisory: rubygem-smart_proxy_dynflow security update | smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature | [
"cpe:/a:redhat:satellite:6.3::el7",
"cpe:/a:redhat:satellite_capsule:6.3::el7"
] | null | null | 9.8 | null |
CVE-2011-5033 | Stack-based buffer overflow in CFS.c in ConfigServer Security & Firewall (CSF) before 5.43, when running on a DirectAdmin server, allows local users to cause a denial of service (crash) via a long string in an admin.list file. | [
"cpe:2.3:a:configserver:configserver_security_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.00:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.07:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.08:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.33:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.34:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.35:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.36:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.37:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.38:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.39:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.40:*:*:*:*:*:*:*",
"cpe:2.3:a:configserver:configserver_security_firewall:5.41:*:*:*:*:*:*:*",
"cpe:2.3:h:directadmin:directadmin_server:*:*:*:*:*:*:*:*"
] | null | null | null | 4.4 |
|
CVE-2017-0857 | Another vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-65122447. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2021-20623 | Video Insight VMS versions prior to 7.8 allows a remote attacker to execute arbitrary code with the system user privilege by sending a specially crafted request. | [
"cpe:2.3:a:panasonic:video_insight_vms:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2019-5060 | An exploitable code execution vulnerability exists in the XPM image rendering function of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow in the colorhash function, allocating too small of a buffer. This buffer can then be written out of bounds, resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability. | [
"cpe:2.3:a:libsdl:sdl2_image:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
CVE-2015-5944 | CoreText in Apple OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2024-8425 | WooCommerce Ultimate Gift Card <= 2.6.0 - Unauthenticated Arbitrary File Upload | The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions in all versions up to, and including, 2.6.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | [] | null | 9.8 | null | null |
GHSA-76cx-3v2m-9952 | SQL injection in Log4cxx when using the ODBC appender to send log messages to a database. No fields sent to the database were properly escaped for SQL injection. This has been the case since at least version 0.9.0(released 2003-08-06)Note that Log4cxx is a C++ framework, so only C++ applications are affected.Before version 1.1.0, the ODBC appender was automatically part of Log4cxx if the library was found when compiling the library. As of version 1.1.0, this must be both explicitly enabled in order to be compiled in.Three preconditions must be met for this vulnerability to be possible:Log4cxx compiled with ODBC support(before version 1.1.0, this was auto-detected at compile time)ODBCAppender enabled for logging messages to, generally done via a config fileUser input is logged at some point. If your application does not have user input, it is unlikely to be affected.Users are recommended to upgrade to version 1.1.0 which properly binds the parameters to the SQL statement, or migrate to the new DBAppender class which supports an ODBC connection in addition to other databases.
Note that this fix does require a configuration file update, as the old configuration files will not configure properly. An example is shown below, and more information may be found in the Log4cxx documentation on the ODBCAppender.Example of old configuration snippet:<param name="sql" value="INSERT INTO logs (message) VALUES ('%m')" />... other params here ...The migrated configuration snippet with new ColumnMapping parameters:<param name="sql" value="INSERT INTO logs (message) VALUES (?)" /><param name="ColumnMapping" value="message"/>
... other params here ... | [] | null | 8.8 | null | null |
|
CVE-2023-0904 | SourceCodester Employee Task Management System task-details.php sql injection | A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file task-details.php. The manipulation of the argument task_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221453 was assigned to this vulnerability. | [
"cpe:2.3:a:employee_task_management_system_project:employee_task_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-gpg6-84h3-cwv8 | After Effects versions 23.6.6, 24.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
GHSA-7ww4-jxrx-jpg2 | Advanced Poll before 1.61, when using a flat file database, allows remote attackers to gain privileges by setting the logged_in parameter. | [] | null | null | null | null |
|
CVE-2025-21879 | btrfs: fix use-after-free on inode when scanning root during em shrinking | In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix use-after-free on inode when scanning root during em shrinking
At btrfs_scan_root() we are accessing the inode's root (and fs_info) in a
call to btrfs_fs_closing() after we have scheduled the inode for a delayed
iput, and that can result in a use-after-free on the inode in case the
cleaner kthread does the iput before we dereference the inode in the call
to btrfs_fs_closing().
Fix this by using the fs_info stored already in a local variable instead
of doing inode->root->fs_info. | [] | null | 7.8 | null | null |
GHSA-9x3m-wmpr-vc58 | CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm. | [] | null | null | null | null |
|
RHSA-2020:2476 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux 7 security update | dotnet: Denial of service via untrusted input | [
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | 7.5 | null | null |
GHSA-6wjw-qf87-fv5v | Laravel Encrypter Failure to decryption vulnerability | A potential exploit of the Laravel Encrypter component that may cause the Encrypter to fail on decryption and unexpectedly return false.To exploit this, the attacker must be able to modify the encrypted payload before it is decrypted. Depending on the code within your application, this could lead to unexpected behavior when combined with weak type comparisons, for example: | [] | null | null | null | null |
CVE-2023-38682 | A vulnerability has been identified in JT2Go (All versions < V14.2.0.5), Teamcenter Visualization V13.2 (All versions < V13.2.0.14), Teamcenter Visualization V14.1 (All versions < V14.1.0.10), Teamcenter Visualization V14.2 (All versions < V14.2.0.5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted TIFF files. This could allow an attacker to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-frp9-2v6r-gj97 | muhammara and hummus vulnerable to null pointer dereference on bad response object | The package muhammara before 2.6.0 and the package hummus before 1.0.111 are vulnerable to Denial of Service (DoS) when PDFStreamForResponse() is used with invalid data. | [] | null | 7.5 | null | null |
GHSA-92rp-9h67-q25v | Multiple SQL injection vulnerabilities in Active Auction House 3.6 allow remote attackers to execute arbitrary SQL commands via the (1) catid parameter to wishlist.asp and the (2) linkid parameter to links.asp. NOTE: vector 1 might overlap CVE-2005-1029.1. | [] | null | null | null | null |
|
GHSA-hr2q-xf62-r4hc | Directory traversal vulnerability in dodosmail.php in DodosMail 2.5 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the dodosmail_header_file parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-c3g7-x55h-8734 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
CVE-2017-3748 | On Lenovo VIBE mobile phones, improper access controls on the nac_server component can be abused in conjunction with CVE-2017-3749 and CVE-2017-3750 to elevate privileges to the root user (commonly known as 'rooting' or "jail breaking" a device). | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a1600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a2560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a2800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a2860:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a2880:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a3600-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a3600u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a3800-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a3900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a6000-i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a6020i37:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a6600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_a6800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_k30-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_k30-w-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_k32c30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:vibe_k80m:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
RHSA-2012:1026 | Red Hat Security Advisory: jbossas and jboss-naming security update | JNDI: unauthenticated remote write access is permitted by default JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
GHSA-wm9w-g37p-3f8p | A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. | [] | null | null | null | null |
|
GHSA-gjrq-w46q-r7w2 | Weak authentication issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier. If this vulnerability is exploited, the authentication may be bypassed with an undocumented specific string. | [] | null | 7.5 | null | null |
|
GHSA-rq7c-3qxq-cq5m | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). | [] | null | null | 8.6 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.