id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2019-14066 | Integer overflow in calculating estimated output buffer size when getting a list of installed Feature IDs, Serial Numbers or checking Feature ID status in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Kamorta, MDM9205, MDM9607, Nicobar, QCS404, QCS405, Rennell, SA6155P, SC7180, SC8180X, SDX55, SM6150, SM7150, SXR2130 | [
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2018-17019 | In Bro through 2.5.5, there is a DoS in IRC protocol names command parsing in analyzer/protocol/irc/IRC.cc. | [
"cpe:2.3:a:bro:bro:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-9563-jv23-5rh9 | The kernel in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly load structured exception handling tables, which allows context-dependent attackers to bypass the SafeSEH security feature by leveraging a Visual C++ .NET 2003 application, aka "Windows Kernel SafeSEH Bypass Vulnerability." | [] | null | null | null | null |
|
GHSA-fxf5-773f-7r9h | Windows AppX Deployment Extensions Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
RHSA-2022:1442 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
GHSA-x3gj-r7r3-v6vj | A plain keystore password is written to a system log file in SAP HANA Extended Application Services, 1.0, which could endanger confidentiality of SSL communication. | [] | null | null | 6.5 | null |
|
GHSA-w7f3-837p-8jxx | Due to lack of protection, parameter student_id in OpenSIS Classic 8.0 /modules/eligibility/Student.php can be used to inject SQL queries to extract information from databases. | [] | null | 7.5 | null | null |
|
CVE-2016-4555 | client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses. | [
"cpe:2.3:a:squid-cache:squid:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:3.5.17:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:squid-cache:squid:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-2jj3-h6g5-p92f | Netgear WG302v2 v5.2.9 and WAG302v2 v5.1.19 were discovered to contain multiple command injection vulnerabilities in the upgrade_handler function via the firmwareRestore and firmwareServerip parameters. | [] | null | 8.8 | null | null |
|
GHSA-h533-q6jc-qx28 | Cloud Foundry Runtime Insufficient Session Expiration vulnerability | The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions. | [] | null | 9.8 | null | null |
GHSA-5wj7-rhf5-hqx4 | An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications. | [] | null | null | 8.1 | null |
|
CVE-2024-27829 | The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.5. Processing a file may lead to unexpected app termination or arbitrary code execution. | [
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2008-3946 | The finger client in HP TCP/IP Services for OpenVMS 5.x allows local users to read arbitrary files via a link corresponding to a (1) .plan or (2) .project file. | [
"cpe:2.3:a:hp:openvms:5:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-wr7g-h8v6-w795 | A vulnerability was found in SourceCodeHero Clothes Recommendation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/index.php of the component Admin Login Page. The manipulation of the argument t1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-fx42-f4v4-hcj3 | Vulnerability of uncontrolled system resource applications in the setting module
Impact: Successful exploitation of this vulnerability may affect availability. | [] | null | 6.6 | null | null |
|
RHSA-2024:9988 | Red Hat Security Advisory: RHOSP 17.1.4 (python-requests) security update | requests: subsequent requests to the same host ignore cert verification | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 5.6 | null | null |
CVE-2024-34547 | WordPress Magical Addons For Elementor plugin <= 1.1.34 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor alam Magical Addons For Elementor allows Stored XSS.This issue affects Magical Addons For Elementor: from n/a through 1.1.34.
| [] | null | 6.5 | null | null |
GHSA-98cq-cjjv-rvr4 | Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached. | [] | null | null | null | null |
|
GHSA-57f3-gghm-9mhc | jspdf vulnerable to Regular Expression Denial of Service (ReDoS) | This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function. | [] | null | 7.5 | null | null |
GHSA-6qqj-rx4w-r3cj | CSRF Vulnerability in jquery-ujs | Versions 1.0.3 and earlier of jquery-ujs are vulnerable to an information leakage attack that may enable attackers to launch CSRF attacks, as it allows attackers to send CSRF tokens to external domains.When an attacker controls the href attribute of an anchor tag, or
the action attribute of a form tag triggering a POST action, the attacker can set the
href or action to " https://attacker.com". By prepending a space to the external domain, it causes jQuery to consider it a same origin request, resulting in the user's CSRF token being sent to the external domain.RecommendationUpgrade jquery-ujs to version 1.0.4 or later. | [] | null | 6.5 | null | null |
CVE-2024-35106 | NEXTU FLETA AX1500 WIFI6 v1.0.3 was discovered to contain a buffer overflow at /boafrm/formIpQoS. This vulnerability allows attackers to cause a Denial of Service (DoS) or potentially arbitrary code execution via a crafted POST request. | [] | null | 4.6 | null | null |
|
GHSA-5p94-chvq-366v | Incomplete blacklist in sanitize_string in Zenphoto before 1.4.9 allows remote attackers to conduct cross-site scripting (XSS) attacks. | [] | null | 6.1 | null | null |
|
GHSA-8h4j-cm33-q84h | An issue was discovered in Samsung eMMC with KLMAG2GE4A and KLM8G1WEMB firmware. Code bypass through Electromagnetic Fault Injection allows an attacker to successfully authenticate and write to the RPMB (Replay Protected Memory Block) area without possessing secret information. | [] | null | 4.9 | null | null |
|
GHSA-h7wm-92m4-v98m | Buffer overflow on Advantech EKI-1200 gateways with firmware before 1.63 allows remote attackers to execute arbitrary code via unspecified vectors. | [] | null | null | null | null |
|
CVE-2021-27165 | An issue was discovered on FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials. | [
"cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fiberhome:hg6245d:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 |
|
RHSA-2023:3588 | Red Hat Security Advisory: thunderbird security update | Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
GHSA-m2g8-2vhm-m4cx | A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code. | [] | null | null | 8.8 | null |
|
GHSA-ghqc-wx9w-j5h4 | Transient DOS in Modem while processing RRC reconfiguration message. | [] | null | 7.5 | null | null |
|
GHSA-g2jv-69ph-8q7w | Infopop Ultimate Bulletin Board (UBB) allows remote attackers to execute commands via shell metacharacters in the topic hidden field. | [] | null | null | null | null |
|
GHSA-777p-2jpw-g9gh | A command injection vulnerabilities have been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. This issue affects: QNAP Systems Inc. QTS versions prior to 4.5.1.1540 build 20210107. QNAP Systems Inc. QuTS hero versions prior to h4.5.1.1582 build 20210217. | [] | null | null | null | null |
|
CVE-2020-6349 | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated GIF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
CVE-2022-29663 | CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/hy. | [
"cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
CVE-2006-3221 | SQL injection vulnerability in index.php in DataLife Engine 4.1 and earlier allows remote attackers to execute arbitrary SQL commands via double-encoded values in the user parameter in a userinfo subaction. | [
"cpe:2.3:a:softnews_media_group:datalife_engine:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-27528 | A maliciously crafted DWFX and SKP files in Autodesk Navisworks 2022 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution. | [
"cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-v9h6-gj8j-4c4v | Multiple untrusted search path vulnerabilities in Nuance PDF Reader 6.0 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) exceptiondumpdll.dll file in the current working directory, as demonstrated by a directory that contains a .pdf file. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
CVE-2023-43457 | An issue in Service Provider Management System v.1.0 allows a remote attacker to gain privileges via the ID parameter in the /php-spms/admin/?page=user/ endpoint. | [
"cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-pv88-4pq6-2f76 | Huawei 1288H V5 and 288H V5 with software of V100R005C00 have a JSON injection vulnerability. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Due to insufficient verification of the input, this could be exploited to obtain the management privilege of the system. | [] | null | null | 8.8 | null |
|
RHSA-2024:5255 | Red Hat Security Advisory: kernel security update | kernel: vt: fix memory overlapping when deleting chars in the buffer amd: Return Address Predictor vulnerability leading to information disclosure kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: tcp: add sanity checks to rx zerocopy kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: arp: Prevent overflow in arp_req_get(). kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 kernel: Squashfs: check the inode number is not the invalid value of zero kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: tcp: properly terminate timers for kernel sockets kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge kernel: i40e: fix vf may be used uninitialized in this function warning kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: net: bridge: xmit: make sure we have at least eth header len bytes kernel: net/mlx5: Discard command completions in internal error | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
GHSA-3jfh-3982-8rhf | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MightyThemes Mighty Classic Pros And Cons allows Stored XSS.This issue affects Mighty Classic Pros And Cons: from n/a through 2.0.9. | [] | null | 6.5 | null | null |
|
GHSA-h3r9-xvwf-gc85 | Time-of-check to time-of-use (TOCTOU) race condition in org.onosproject.acl (aka the access control application) in ONOS v1.13 and earlier allows attackers to bypass network access control via data plane packet injection. | [] | null | null | 6.8 | null |
|
GHSA-vwvw-v6rg-hjcx | In avrc_ctrl_pars_vendor_cmd of avrc_pars_ct.cc, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-205571133 | [] | null | 6.5 | null | null |
|
GHSA-rjp4-x6wp-r79j | mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089. | [] | null | null | null | null |
|
CVE-2022-43280 | wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallExpr->GetReturnCallDropKeepCount. | [
"cpe:2.3:a:webassembly:wabt:1.0.29:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
GHSA-rpg4-7fqf-qjwf | Unauthenticated Stored XSS in osTicket 1.10.1 allows a remote attacker to gain admin privileges by injecting arbitrary web script or HTML via arbitrary file extension while creating a support ticket. | [] | null | null | 6.1 | null |
|
CVE-2007-6572 | Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204. | [
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp10:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp8:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp9:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp10:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp7:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-6337 | For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device. | [
"cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j3p65a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j3p65a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u57a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u57a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u51b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u51b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v78b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v78b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:w2z52b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:w2z52b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q19b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q19b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:w2z53b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:w2z53b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:2dr21d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:2dr21d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9z74a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9z74a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9z74d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9z74d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q21b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q21b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9z76b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9z76b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*"
] | null | 5.2 | null | 3.3 |
|
CVE-2021-39995 | Some Huawei products use the OpenHpi software for hardware management. A function that parses data returned by OpenHpi contains an out-of-bounds read vulnerability that could lead to a denial of service. Affected product versions include: eCNS280_TD V100R005C10; eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300. | [
"cpe:2.3:o:huawei:ecns280_td_firmware:v100r005c10:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ecns280_td:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ese620x_vess_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ese620x_vess_firmware:v100r001c20spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ese620x_vess_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ese620x_vess:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.8 |
|
CVE-2016-10619 | pennyworth is a natural language templating engine. pennyworth downloads data resources over HTTP, which leaves it vulnerable to MITM attacks. | [
"cpe:2.3:a:pennyworth_project:pennyworth:*:*:*:*:*:node.js:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2023-21009 | In multiple locations of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-257029925 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2022-36551 | A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to create a new account and then exploit the SSRF. | [
"cpe:2.3:a:heartex:label_studio:*:*:*:*:community:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-94gg-72cx-mg6f | An issue in Sourcebans++ before v.1.8.0 allows a remote attacker to obtain sensitive information via a crafted XAJAX call to the Forgot Password function. | [] | null | 7.5 | null | null |
|
CVE-2023-23950 | User’s supplied input (usually a CRLF sequence) can be used to split a returning response into two responses. | [
"cpe:2.3:a:broadcom:symantec_identity_governance_and_administration:14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:symantec_identity_governance_and_administration:14.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:symantec_identity_governance_and_administration:14.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:symantec_identity_manager:14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:symantec_identity_manager:14.4:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2012-4325 | Cross-site request forgery (CSRF) vulnerability in upload/users.php in Utopia News Pro (UNP) 1.4.0 and earlier allows remote attackers to hijack the authentication of administrators for requests that add administrator accounts. | [
"cpe:2.3:a:utopiasoftware:news_pro:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-8c37-7qx3-4c4p | Blst has logical error in SigValidate in Go bindings | ImpactBlst versions v0.3.0 through 0.3.10 failed to perform a signature group-check if the call to `SigValidate` in the Go bindings was complemented with a check for infinity. Formally speaking, infinity, or the identity element of the elliptic curve group, is a member of the group, and the group-check should allow it. An initial review of blst users on GitHub did not uncover any use of this function with the complementary infinity check. This optional check was added as a convenience feature because despite infinity being a legitimate member of the group, individual signatures should never be infinite (as it is equivalent to having zero for the secret key), and observing one should raise a flag.DescriptionThe vulnerable function is declared as `SigValidate(sigInfcheck bool) bool` and if called with `sigInfcheck` argument set to `true`, the group-check was omitted. The group-check is required to be performed on untrusted input, because the pairing, the corner-stone operation of the signature scheme, is defined only on points that are members of a specific cyclic group, which is a subset of all the possible points on elliptic curves in question. Submitting an untrusted point outside the group opens up the possibility of accepting an alternative signature for a chosen message.It should be noted that the SigValidate call is not the only way to perform the group-checks. There are optional checks integrated into various other verification methods, such as `Verify`, `AggregateVerify`, etc., as well as signature aggregation methods, such as `PairingAggregate*`. The reason why there are multiple options is that the group-check is a relatively expensive operation, and application developers are arguably entitled the freedom to choose when it's performed.PatchesThis issue has been resolved in the v0.3.11 release and users are advised to update if their application is affected or alternatively omit the complementary infinity check.CreditsA special thanks to Yunjong Jeong (@blukat29) for the discovery and disclosure of this vulnerability. | [] | null | null | null | null |
GHSA-4m5c-wmrf-g2j6 | Integer signedness error in Apple Safari allows remote attackers to read the contents of arbitrary memory locations, cause a denial of service (application crash), and probably have unspecified other impact via the array index of the arguments array in a JavaScript function, possibly a related issue to CVE-2008-2307. | [] | null | null | null | null |
|
CVE-2021-26807 | GalaxyClient version 2.0.28.9 loads unsigned DLLs such as zlib1.dll, libgcc_s_dw2-1.dll and libwinpthread-1.dll from PATH, which allows an attacker to potentially run code locally through unsigned DLL loading. | [
"cpe:2.3:a:gog:galaxy:2.0.28.9:*:*:*:*:windows:*:*"
] | null | 7.8 | null | 4.4 |
|
CVE-2005-0069 | The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files. | [
"cpe:2.3:a:vim_development_group:vim:6.3.011:*:*:*:*:*:*:*",
"cpe:2.3:a:vim_development_group:vim:6.3.025:*:*:*:*:*:*:*",
"cpe:2.3:a:vim_development_group:vim:6.3.030:*:*:*:*:*:*:*",
"cpe:2.3:a:vim_development_group:vim:6.3.044:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2023-43357 | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the Manage Shortcuts component. | [
"cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
CVE-2022-30780 | Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read operations on large headers. | [
"cpe:2.3:a:lighttpd:lighttpd:1.4.56:*:*:*:*:*:*:*",
"cpe:2.3:a:lighttpd:lighttpd:1.4.57:*:*:*:*:*:*:*",
"cpe:2.3:a:lighttpd:lighttpd:1.4.58:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-x52m-5p7x-3jmp | Unknown vulnerability in Incoming Remote Command (iSeries Access for Windows Remote Command service) in IBM OS/400 R510, R520, and R530 allows attackers to cause a denial of service (IRC shutdown) via certain inputs. | [] | null | null | null | null |
|
GHSA-w52f-78r3-v89r | The improper privilege management vulnerability in the Zyxel WBE660S firmware version 6.70(ACGG.3) and earlier versions could allow an authenticated user to escalate privileges and download the configuration files on a vulnerable device. | [] | null | 6.5 | null | null |
|
GHSA-8jxf-74xp-9728 | Stored XSS viva .svg file upload in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse. | [] | null | 9 | null | null |
|
CVE-2023-30931 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2008-4989 | The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN). | [
"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
|
CVE-2018-14710 | Cross-site scripting in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to execute JavaScript via the "hook" URL parameter. | [
"cpe:2.3:o:asus:rt-ac3200_firmware:3.0.0.4.382.50010:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-pxx4-4592-hf5h | In vpu, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05371580. | [] | null | null | null | null |
|
GHSA-g2vh-rcx2-8pp8 | Unspecified vulnerability in Record Management Services (RMS) before VMS83A_RMS-V1100 for HP OpenVMS on the Alpha platform allows local users to gain privileges via unknown vectors. | [] | null | null | null | null |
|
CVE-2025-31200 | A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS. | [] | null | 6.8 | null | null |
|
GHSA-q43h-4xr8-j6fq | XML External Entity (XXE) vulnerability in Milton Webdav before 2.7.0.3. | [] | null | null | 9.8 | null |
|
RHSA-2015:0425 | Red Hat Security Advisory: openssh security, bug fix and enhancement update | openssh: failure to check DNS SSHFP records in certain scenarios openssh: ~/.k5users unexpectedly grants remote login | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2018-1014 | An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-1005, CVE-2018-1032, CVE-2018-1034. | [
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*"
] | null | null | 5.4 | 4.9 |
|
CVE-2018-1000557 | OCS Inventory OCS Inventory NG version ocsreports 2.4 contains a Cross Site Scripting (XSS) vulnerability in login form and search functionality that can result in An attacker is able to execute arbitrary (javascript) code within a victims' browser. This attack appear to be exploitable via Victim must open a crafted link to the application. This vulnerability appears to have been fixed in ocsreports 2.4.1. | [
"cpe:2.3:a:ocsinventory-ng:ocsinventory_ng:2.4:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2011-2901 | Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits. | [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*"
] | null | null | null | 5.5 |
|
GHSA-h7pr-8hq5-jjcc | Untrusted search path vulnerability in the CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and earlier allows attackers to trigger the launch of a Trojan horse app_process program via a crafted PATH environment variable for a /system/xbin/su process. | [] | null | null | null | null |
|
GHSA-4fmm-h427-wp43 | A vulnerability was found in phpscriptpoint BloodBank 1.1. It has been rated as problematic. This issue affects some unknown processing of the file page.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235205 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 3.5 | null |
|
RHSA-2024:5433 | Red Hat Security Advisory: OpenShift Container Platform 4.14.35 security update | opentelemetry: DoS vulnerability in otelhttp golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-retryablehttp: url might write sensitive information to log file golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses kernel: net: kernel: UAF in network route management | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.8 | null | null |
GHSA-wcg5-6pc8-hjf5 | Memory corruption due to double free in Core while mapping HLOS address to the list. | [] | null | 8.4 | null | null |
|
GHSA-wv87-pvg9-6gcf | Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors. | [] | null | null | null | null |
|
GHSA-753g-f73x-8w98 | tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c | [] | null | 5.5 | null | null |
|
CVE-2023-35324 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-m2v4-vxvf-w4v4 | Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources. | [] | null | 8.8 | null | null |
|
CVE-2021-44141 | All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 4.3 | null | 3.5 |
|
CVE-2021-37254 | In M-Files Web product with versions before 20.10.9524.1 and 20.10.9445.0, a remote attacker could use a flaw to obtain unauthenticated access to 3rd party component license key information on server. | [
"cpe:2.3:a:m-files:m-files_web:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2025:8303 | Red Hat Security Advisory: OpenShift Container Platform 4.12.77 bug fix and security update | libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) libxslt: Use-After-Free in libxslt numbers.c | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.8 | null | null |
CVE-2022-3821 | An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service. | [
"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2001-1427 | Unknown vulnerability in ColdFusion Server 2.0 through 4.5.1 SP2 allows remote attackers to overwrite templates with zero byte files via unknown attack vectors. | [
"cpe:2.3:a:macromedia:coldfusion:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:4.5.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:4.5.1:sp2:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-14372 | In Libav 12.3, there is an infinite loop in the function wv_read_block_header() in the file wvdec.c. | [
"cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-948x-86gr-h2wj | Unspecified vulnerability in the RV20 codec in RealNetworks RealPlayer before 15.0.0 and Mac RealPlayer before 12.0.0.1703 allows remote attackers to execute arbitrary code via unknown vectors. | [] | null | null | null | null |
|
CVE-2023-32632 | A command execution vulnerability exists in the validate.so diag_ping_start functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability. | [
"cpe:2.3:o:yifanwireless:yf325_firmware:1.0_20221108:*:*:*:*:*:*:*",
"cpe:2.3:h:yifanwireless:yf325:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2022-41123 | Microsoft Exchange Server Elevation of Privilege Vulnerability | Microsoft Exchange Server Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_22:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_11:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2021-30743 | An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 14.5 and iPadOS 14.5, watchOS 7.4, Security Update 2021-003 Catalina, tvOS 14.5, macOS Big Sur 11.3. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2025-22983 | An access control issue in the component /square/getAllSquare/circle of iceCMS v2.2.0 allows unauthenticated attackers to access sensitive information. | [] | null | 7.5 | null | null |
|
GHSA-xw2h-wpqw-cc8g | The Swish payments (aka se.bankgirot.swish) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-4wfm-8gw8-6vq9 | Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX. | [] | null | null | null | null |
|
GHSA-68vr-8f46-vc9f | Username spoofing in OnionShare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.Vulnerability ID: OTF-005Vulnerability type: Improper Input SanitizationThreat level: LowDescription:It is possible to change the username to that of another chat participant with an additional space character at the end of the name string.Technical description:Assumed users in Chat:AliceBobMalloryMallory renames to `Alice `.Mallory sends message as `Alice `.Alice and Bob receive a message from Mallory disguised as `Alice `, which is hard to distinguish from the `Alice`
in the web interface.
Other (invisible) whitespace characters were found to be working as well.Impact:An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.Recommendation:Remove non-visible characters from the username | [] | 5.3 | 4.3 | null | null |
CVE-2025-20883 | Improper access control in SoundPicker prior to SMR Jan-2025 Release 1 allows physical attackers to access data across multiple user profiles. | [] | null | 4.6 | null | null |
|
PYSEC-2018-65 | null | MicroPyramid Django-CRM 0.2 allows CSRF for /users/create/, /users/##/edit/, and /accounts/##/delete/ URIs. | [] | null | null | null | null |
GHSA-fxh3-m8cp-mg9j | Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] | null | null | null | null |
|
GHSA-8x66-w66p-wqj8 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in I Thirteen Web Solution Email Subscription Popup allows Blind SQL Injection. This issue affects Email Subscription Popup: from n/a through 1.2.23. | [] | null | 7.6 | null | null |
|
GHSA-4pp2-3663-mcw8 | A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the custom snippets feature to obtain all secrets in the cluster. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.