id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-8ggf-rh55-625w
Rockliffe MailSite Express before 6.1.22, with the option to save login information enabled, saves user passwords in plaintext in cookies, which allows local users to obtain passwords by reading the cookie file, or remote attackers to obtain the cookies via cross-site scripting (XSS) vulnerabilities.
[]
null
null
null
null
null
RHSA-2009:1689
Red Hat Security Advisory: condor security update
Condor: queue super user cannot drop privs
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
null
GHSA-ppcw-xw3x-c247
Cross-Site Request Forgery (CSRF) vulnerability in Analytify.This issue affects Analytify: from n/a through 5.2.3.
[]
null
5.4
null
null
null
GHSA-hpv4-mq4h-frcq
A vulnerability has been found in LinZhaoguan pb-cms 2.0 and classified as problematic. This vulnerability affects unknown code of the component Logout. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
4.3
null
null
null
GHSA-hp7r-jqgx-jfh4
Reflected XSS in wordpress plugin s3-video v0.983
[]
null
null
6.1
null
null
CVE-2024-30290
Adobe FrameMaker WEBP File Parsing Out Of Bound Write
Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:framemaker:2020:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:framemaker:2022:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-9j46-7cvf-xwqv
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of encrypted IP cyphertext to insert hardware trojans. The methods are flawed and, in the most egregious cases, enable attack vectors that allow recovery of the entire underlying plaintext IP. Implementations of IEEE P1735 may be weak to cryptographic attacks that allow an attacker to obtain plaintext intellectual property without the key, among other impacts.
[]
null
null
7.8
null
null
CVE-2024-55515
A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_ipslib.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded.
[]
null
9.8
null
null
null
GHSA-37hc-xgcp-m6w2
Directory traversal vulnerability in Abyss Web Server 1.0.3 allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in an HTTP GET request.
[]
null
null
null
null
null
GHSA-j842-m828-pqm3
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to spoof the address bar via a crafted web site that uses FRAME elements.
[]
null
null
6.5
null
null
CVE-2018-1085
openshift-ansible before versions 3.9.23, 3.7.46 deploys a misconfigured etcd file that causes the SSL client certificate authentication to be disabled. Quotations around the values of ETCD_CLIENT_CERT_AUTH and ETCD_PEER_CLIENT_CERT_AUTH in etcd.conf result in etcd being configured to allow remote users to connect without any authentication if they can access the etcd server bound to the network on the master nodes. An attacker could use this flaw to read and modify all the data about the Openshift cluster in the etcd datastore, potentially adding another compute node, or bringing down the entire cluster.
[ "cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*" ]
null
null
9
null
null
GHSA-w8gx-3wmm-9f69
Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
[]
null
4.3
null
null
null
GHSA-6hm9-wj83-37rw
SAP NetWeaver AS ABAP (Web Dynpro), versions - 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, that allows them to read and delete database logfiles because of Improper Access Control.
[]
null
8.8
null
null
null
GHSA-j9jq-pgcg-7c7v
Incorrect use of privileged API in UniversalCredentialManager prior to SMR Sep-2024 Release 1 allows local attackers to access privileged API related to UniversalCredentialManager.
[]
null
6.2
null
null
null
GHSA-82pg-3gx5-h8mr
SQL injection vulnerability in pages.php in Custom Pages 1.0 plugin for MyBulletinBoard (MyBB) allows remote attackers to execute arbitrary SQL commands via the page parameter.
[]
null
null
null
null
null
GHSA-vfjx-wr4w-wgfh
In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
[]
null
4.4
null
null
null
CVE-2018-15984
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
GHSA-5vpg-rf76-m7c5
Tenda AX12 V22.03.01.46 was discovered to contain a stack overflow via the list parameter at /goform/SetVirtualServerCfg.
[]
null
9.8
null
null
null
GHSA-crhm-wc96-7579
An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities.
[]
null
9.8
null
null
null
GHSA-hv46-jgp2-xm54
Security keys are logged when any WCDMA call is configured or reconfigured in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDX20, SXR1130.
[]
null
null
5.5
null
null
CVE-2003-1459
Multiple PHP remote file inclusion vulnerabilities in ttCMS 2.2 and ttForum allow remote attackers to execute arbitrary PHP code via the (1) template parameter in News.php or (2) installdir parameter in install.php.
[ "cpe:2.3:a:ttcms:ttcms:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ttcms:ttforum:1.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2019-13643
Stored XSS in EspoCRM before 5.6.4 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The attack begins by storing a new stream message containing an XSS payload. The stored payload can then be triggered by clicking a malicious link on the Notifications page.
[ "cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-f73v-m2mr-g59v
The 404s WordPress plugin before 3.5.1 does not sanitise and escape its fields, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
[]
null
4.8
null
null
null
GHSA-q7cg-43mg-qp69
ASP.NET Core Information Disclosure Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1 and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.An information disclosure vulnerability exists in .NET 5.0, .NET Core 3.1 and .NET Core 2.1 where a JWT token is logged if it cannot be parsed.PatchesIf you're using .NET 5.0, you should download and install Runtime 5.0.9 or SDK 5.0.206 (for Visual Studio 2019 v16.8) or SDK 5.0.303 (for Visual Studio 2019 V16.10) from https://dotnet.microsoft.com/download/dotnet-core/5.0.If you're using .NET Core 3.1, you should download and install Runtime 3.1.18 or SDK 3.1.118 (for Visual Studio 2019 v16.4) or 3.1.412 (for Visual Studio 2019 v16.7 or later) from https://dotnet.microsoft.com/download/dotnet-core/3.1.If you're using .NET Core 2.1, you should download and install Runtime 2.1.29 or SDK 2.1.525 (for Visual Studio 2019 v15.9) or 2.1.817 from https://dotnet.microsoft.com/download/dotnet-core/2.1.If your application is using .NET Core 2.1 running on .NET Framework see the [Updating .NET Core 2.1 on .NET Framework](#updating-2.1) section below.<a name="updating-2.1"></a> Updating .NET Core 2.1 on .NET FrameworkIf you are running .NET Core 2.1 on .NET Framework you need to check your projects for dependencies and update them accordingly.Direct dependenciesDirect dependencies are discoverable by examining your `csproj` file. They can be fixed by [editing the project file](#fixing-direct-dependencies) or using NuGet to update the dependency.Transitive dependenciesTransitive dependencies occur when you add a package to your project that in turn relies on another package. For example, if Contoso publishes a package `Contoso.Utility` which, in turn, depends on `Contoso.Internals` and you add the `Contoso.Utility` package to your project now your project has a direct dependency on `Contoso.Utility` and, because `Contoso.Utility` depends 'Contoso.Internals', your application gains a transitive dependency on the `Contoso.Internals` package.Transitive dependencies are reviewable in two ways:In the Visual Studio Solution Explorer window, which supports searching.By examining the `project.assets.json` file contained in the obj directory of your project for `csproj` based projectsThe `project.assets.json` files are the authoritative list of all packages used by your project, containing both direct and transitive dependencies.There are two ways to view transitive dependencies. You can either [use Visual Studio’s Solution Explorer](#vs-solution-explorer), or you can review [the `project.assets.json` file](#project-assets-json)).<a name="vs-solution-explorer"></a>Using Visual Studio Solution ExplorerTo use Solution Explorer, open the project in Visual Studio, and then press Ctrl+; to activate the search in Solution Explorer. Search for the [vulnerable package](#affected-software) and make a note of the version numbers of any results you find.For example, search for `Microsoft.AspNetCore.Authentication.JwtBearer` and update the package to the latest version<a name="project-assets-json"></a> Manually reviewing project.assets.jsonOpen the *project.assets.json* file from your project’s obj directory in your editor. We suggest you use an editor that understands JSON and allows you to collapse and expand nodes to review this file. Visual Studio and Visual Studio Code provide JSON friendly editing.Search the *project.assets.json* file for the [vulnerable package](#affected-software), using the format `packagename/` for each of the package names from the preceding table. If you find the assembly name in your search:Examine the line on which they are found, the version number is after the `/`.Compare to the [vulnerable versions table](#affected-software).For example, a search result that shows `Microsoft.AspNetCore.Authentication.JwtBearer/2.1.0` is a reference to version 2.1.1 of `Microsoft.AspNetCore.Authentication.JwtBearer`.If your *project.assets.json* file includes references to the [vulnerable package](#affected-software), then you need to fix the transitive dependencies.If you have not found any reference to any vulnerable packages, this means eitherNone of your direct dependencies depend on any vulnerable packages, orYou have already fixed the problem by updating the direct dependencies.Other DetailsAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/195An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/35246MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34532
[]
null
5.5
null
null
null
CVE-2004-2132
Directory traversal vulnerability in PJreview_Neo.cgi in PJ CGI Neo review allows remote attackers to read arbitrary files via a .. (dot dot) in the p parameter.
[ "cpe:2.3:a:pj_cgi_neo_review:pj_cgi_neo_review:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2016-4601
QuickTime in Apple OS X before 10.11.6 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted SGI image.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-69wc-xq49-r64g
HP JetAdmin D.01.09 on Solaris allows local users to change the permissions of arbitrary files via a symlink attack on the /tmp/jetadmin.log file.
[]
null
null
null
null
null
GHSA-59x9-wc3w-x8gc
All the Toshiba printers contain a shell script using the same hardcoded key to encrypt logs. An attacker can decrypt the encrypted files using the hardcoded key. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.
[]
null
6.2
null
null
null
CVE-2016-3678
Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.
[ "cpe:2.3:a:huawei:s5300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:s5700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
null
CVE-2021-22390
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed.
[ "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2009-0246
Stack-based buffer overflow in easyHDR PRO 1.60.2 allows user-assisted attackers to execute arbitrary code via an invalid Radiance RGBE (aka .hdr) file.
[ "cpe:2.3:a:easyhdr:easyhdr:1.60.2:*:pro:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-x4px-54q2-j29c
A vulnerability in the SFTP server implementation for Cisco Nexus 3000 Series Switches and 9000 Series Switches in standalone NX-OS mode could allow an authenticated, remote attacker to download or overwrite files from the underlying operating system of an affected device.This vulnerability is due to a logic error when verifying the user role when an SFTP connection is opened to an affected device. An attacker could exploit this vulnerability by connecting and authenticating via SFTP as a valid, non-administrator user. A successful exploit could allow the attacker to read or overwrite files from the underlying operating system with the privileges of the authenticated user.There are workarounds that address this vulnerability.
[]
null
5.4
null
null
null
CVE-2002-0303
GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password.
[ "cpe:2.3:a:novell:groupwise:6.0:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2021-37001
There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified.
[ "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2022-4132
Memory leak on tls connections
A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
[ "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9", "cpe:/a:redhat:jboss_enterprise_web_server:3", "cpe:/a:redhat:jboss_enterprise_web_server:5", "cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
GHSA-m2v5-64rq-5gxg
Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
6.1
null
null
CVE-2014-3838
ownCloud Server before 5.0.16 and 6.0.x before 6.0.3 does not properly check permissions, which allows remote authenticated users to read the names of files of other users by leveraging access to multiple accounts.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:a:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.2:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2017-17121
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (memory access violation) or possibly have unspecified other impact via a COFF binary in which a relocation refers to a location after the end of the to-be-relocated section.
[ "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
GHSA-5hh2-rr8p-rqmr
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.
[]
null
null
null
null
null
GHSA-vhxj-j4c2-74wh
Multiple PHP remote file inclusion vulnerabilities in OpenDock Easy Doc 1.4 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the doc_directory parameter in (1) down_stat.php, (2) file.php, (3) find_file.php, (4) lib_file.php, and (5) lib_form_file.php in sw/lib_up_file/; (6) find_comment.php, (7) comment.php, and (8) lib_comment.php in sw/lib_comment/; (9) sw/lib_find/find.php; and other unspecified PHP scripts.
[]
null
null
null
null
null
PYSEC-2023-142
null
Vyer is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In versions 0.2.15, 0.2.16 and 0.3.0, named re-entrancy locks are allocated incorrectly. Each function using a named re-entrancy lock gets a unique lock regardless of the key, allowing cross-function re-entrancy in contracts compiled with the susceptible versions. A specific set of conditions is required to result in misbehavior of affected contracts, specifically: a `.vy` contract compiled with `vyper` versions `0.2.15`, `0.2.16`, or `0.3.0`; a primary function that utilizes the `@nonreentrant` decorator with a specific `key` and does not strictly follow the check-effects-interaction pattern (i.e. contains an external call to an untrusted party before storage updates); and a secondary function that utilizes the same `key` and would be affected by the improper state caused by the primary function. Version 0.3.1 contains a fix for this issue.
[]
null
5.9
null
null
null
CVE-2017-12481
The find_option function in option.cc in Ledger 3.1.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
[ "cpe:2.3:a:ledger-cli:ledger:3.1.1:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
GHSA-7wh8-jrq7-p27f
SimpleSAMLphp exposes credentials in session storage
BackgroundIn order to implement support for the SAML Enhanced Client or Proxy profile, the credentials obtained for authentication were stored in the state in order to pass them to the relevant routines. This, however, led to the credentials being recorded in the user’s session, which can be stored in permanent storage such as the local file system or a remote memcache or database server.DescriptionWhen an authentication request is received via the ECP profile, the username and password obtained this way were saved to the state array, which is used to pass relevant data to different routines that may need it. This is not a problem in itself. However, when the ECP profile is disabled in the Identity Provider, other bindings such as HTTP-POST or HTTP-Redirect will be used, and since redirections are involved, the state array is then persisted to the user’s session, effectively storing it in the session backend.The ECP profile, which uses the SOAP and PAOS bindings, does not involve any HTTP redirection for the user, and for that reason the state array containing the credentials is never persisted to the session. The logic for determining when to save the credentials to the state array assumed wrongly, though, that if the authentication request came in on the SOAP binding, that means the ECP profile is used. This may not be true as ECP can be disabled by configuration in the IdP’s hosted SAML metadata, and in that case SimpleSAMLphp would then try to default to a binding different than PAOS, such as HTTP-POST or HTTP-Redirect, effectively consolidating the entire state array to the user’s session as described before.In practice, any Identity Provider with the ECP profile disabled but metadata for an entity that supports ECP, would reject incoming ECP requests, but write the credentials obtained in the request to the user’s session, which will be stored in the session store, whichever is used (local file system in case PHP sessions are used, Memcache, Redis, relational databases, etc).Affected versionsAll SimpleSAMLphp versions 1.16.x are affected, up to 1.16.2.ImpactAn Identity Provider with metadata for trusted entities that support the SAML ECP profile, may end up storing the user’s credentials received from such entities in its own session storage, whatever that is, in case ECP is actually not enabled in the IdP. Under such circumstances, the credentials may be then accessible to administrators, other personnel or even malicious parties who may have access to the systems where sessions or their backups are stored.
[]
null
5.3
null
null
null
GHSA-6hhv-cvx8-rhvf
The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image.
[]
null
null
6.5
null
null
CVE-2025-23104
An issue was discovered in Samsung Mobile Processor Exynos 2200. A Use-After-Free in the mobile processor leads to privilege escalation.
[]
null
6.5
null
null
null
GHSA-f84j-qc2w-2jwg
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PickPlugins Post Grid allows Reflected XSS.This issue affects Post Grid: from n/a through 2.2.74.
[]
null
7.1
null
null
null
GHSA-293p-8p8x-wx39
SmarterTools SmarterStats 6.2.4100 generates web pages containing external links in response to GET requests with query strings for frmGettingStarted.aspx, which makes it easier for remote attackers to obtain sensitive information by reading (1) web-server access logs or (2) web-server Referer logs, related to a "cross-domain Referer leakage" issue.
[]
null
null
null
null
null
CVE-2002-1542
SolarWinds TFTP server 5.0.55 and earlier allows remote attackers to cause a denial of service (crash) via a large UDP datagram, possibly triggering a buffer overflow.
[ "cpe:2.3:a:solarwinds:tftp_server:5.0.55_standard:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-27jx-wc84-xqv7
Multiple cross-site scripting (XSS) vulnerabilities in JGS-XA JGS-Portal 3.0.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) anzahl_beitraege parameter to jgs_portal.php, (2) year parameter to jgs_portal_statistik.php, (3) year parameter to jgs_portal_beitraggraf.php, (4) tag parameter to jgs_portal_viewsgraf.php, (5) year parameter to jgs_portal_themengraf.php, (6) year parameter to jgs_portal_mitgraf.php, (7) id parameter to jgs_portal_sponsor.php, or (8) the Accept-Language header to jgs_portal_log.php. NOTE: this issue may stem from the same core problem as CVE-2005-1633.
[]
null
null
null
null
null
GHSA-52wq-q527-xcxw
The VpxVideoDecoder::VpxDecode function in media/filters/vpx_video_decoder.cc in the vpxdecoder implementation in Google Chrome before 41.0.2272.76 does not ensure that alpha-plane dimensions are identical to image dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted VPx video data.
[]
null
null
null
null
null
CVE-2008-1154
The Disaster Recovery Framework (DRF) master server in Cisco Unified Communications products, including Unified Communications Manager (CUCM) 5.x and 6.x, Unified Presence 1.x and 6.x, Emergency Responder 2.x, and Mobility Manager 2.x, does not require authentication for requests received from the network, which allows remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:cisco:emergency_responder:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:mobility_manager:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_presence:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_presence:6.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-hcpj-5jqq-8232
Cross-Site Request Forgery (CSRF) vulnerability in Mailrelay plugin <= 2.1.1 versions.
[]
null
4.3
null
null
null
GHSA-32r9-2j7h-3vqq
A reflected cross-site scripting (XSS) vulnerability in the parent parameter in the index page of vTiger CRM 7.4.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload.
[]
null
7.4
null
null
null
CVE-2022-26668
ASUS Control Center - Broken Access Control
ASUS Control Center API has a broken access control vulnerability. An unauthenticated remote attacker can call privileged API functions to perform partial system operations or cause partial disrupt of service.
[ "cpe:2.3:a:asus:control_center:1.4.2.5:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
CVE-2024-0716
Byzoro Smart S150 Management Platform Backup File download.php information disclosure
A vulnerability classified as problematic has been found in Byzoro Smart S150 Management Platform V31R02B15. This affects an unknown part of the file /log/download.php of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-251541 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:byzoro:smart_s150:-:*:*:*:*:*:*:*", "cpe:2.3:o:byzoro:smart_s150_firmware:31r02b15:*:*:*:*:*:*:*" ]
null
3.1
3.1
2.1
null
GHSA-cg5c-5558-3qmm
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. An app may be able to access user-sensitive data.
[]
null
5.5
null
null
null
RHSA-2017:1681
Red Hat Security Advisory: qemu-kvm security update
Qemu: nbd: segmentation fault due to client non-negotiation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
null
GHSA-jpgv-32fg-p7jv
Tobesoft Xplatform 9.2.2.250 and earlier version have an arbitrary code execution vulnerability by using method supported by Xplatform ActiveX Control. It allows attacker to cause remote code execution.
[]
null
null
null
null
null
CVE-2021-40734
Adobe Audition Memory Corruption could lead to Arbitrary code execution
Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
[ "cpe:2.3:a:adobe:audition:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
CVE-2021-30802
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-69xm-pcg8-8qxm
In Moodle 2.x and 3.x, non-admin site managers may accidentally edit admins via web services.
[]
null
null
4.3
null
null
RHSA-2024:9576
Red Hat Security Advisory: libsoup security update
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
null
GHSA-vrxx-q897-j52j
Cross-Site Request Forgery (CSRF) vulnerability in ip2location IP2Location World Clock allows Stored XSS. This issue affects IP2Location World Clock: from n/a through 1.1.9.
[]
null
7.1
null
null
null
GHSA-c38j-ccr2-v3jw
An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory.
[]
null
7.1
null
null
null
GHSA-7c52-6wjh-x2v8
Rejected reason: Not used
[]
null
null
null
null
null
CVE-2022-49901
blk-mq: Fix kmemleak in blk_mq_init_allocated_queue
In the Linux kernel, the following vulnerability has been resolved: blk-mq: Fix kmemleak in blk_mq_init_allocated_queue There is a kmemleak caused by modprobe null_blk.ko unreferenced object 0xffff8881acb1f000 (size 1024): comm "modprobe", pid 836, jiffies 4294971190 (age 27.068s) hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 00 53 99 9e ff ff ff ff .........S...... backtrace: [<000000004a10c249>] kmalloc_node_trace+0x22/0x60 [<00000000648f7950>] blk_mq_alloc_and_init_hctx+0x289/0x350 [<00000000af06de0e>] blk_mq_realloc_hw_ctxs+0x2fe/0x3d0 [<00000000e00c1872>] blk_mq_init_allocated_queue+0x48c/0x1440 [<00000000d16b4e68>] __blk_mq_alloc_disk+0xc8/0x1c0 [<00000000d10c98c3>] 0xffffffffc450d69d [<00000000b9299f48>] 0xffffffffc4538392 [<0000000061c39ed6>] do_one_initcall+0xd0/0x4f0 [<00000000b389383b>] do_init_module+0x1a4/0x680 [<0000000087cf3542>] load_module+0x6249/0x7110 [<00000000beba61b8>] __do_sys_finit_module+0x140/0x200 [<00000000fdcfff51>] do_syscall_64+0x35/0x80 [<000000003c0f1f71>] entry_SYSCALL_64_after_hwframe+0x46/0xb0 That is because q->ma_ops is set to NULL before blk_release_queue is called. blk_mq_init_queue_data blk_mq_init_allocated_queue blk_mq_realloc_hw_ctxs for (i = 0; i < set->nr_hw_queues; i++) { old_hctx = xa_load(&q->hctx_table, i); if (!blk_mq_alloc_and_init_hctx(.., i, ..)) [1] if (!old_hctx) break; xa_for_each_start(&q->hctx_table, j, hctx, j) blk_mq_exit_hctx(q, set, hctx, j); [2] if (!q->nr_hw_queues) [3] goto err_hctxs; err_exit: q->mq_ops = NULL; [4] blk_put_queue blk_release_queue if (queue_is_mq(q)) [5] blk_mq_release(q); [1]: blk_mq_alloc_and_init_hctx failed at i != 0. [2]: The hctxs allocated by [1] are moved to q->unused_hctx_list and will be cleaned up in blk_mq_release. [3]: q->nr_hw_queues is 0. [4]: Set q->mq_ops to NULL. [5]: queue_is_mq returns false due to [4]. And blk_mq_release will not be called. The hctxs in q->unused_hctx_list are leaked. To fix it, call blk_release_queue in exception path.
[]
null
5.5
null
null
null
CVE-2022-46884
A potential use-after-free vulnerability existed in SVG Images if the Refresh Driver was destroyed at an inopportune time. This could have lead to memory corruption or a potentially exploitable crash. *Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox < 106.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-4257
BlueNet Technology Clinical Browsing System deleteStudy.php sql injection
A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has been classified as critical. This affects an unknown part of the file /xds/deleteStudy.php. The manipulation of the argument documentUniqueId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-262149 was assigned to this vulnerability.
[ "cpe:2.3:a:bluenet_technology:clinical_browsing_system:1.2.1:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
CVE-2019-7340
POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'filter[Query][terms][0][val]' parameter value in the view filter (filter.php) because proper filtration is omitted.
[ "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2022-4619
The Sidebar Widgets by CodeLights plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Extra CSS class’ parameter in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[ "cpe:2.3:a:codelights-shortcodes-and-widgets_project:codelights-shortcodes-and-widgets:*:*:*:*:*:wordpress:*:*" ]
null
5.5
null
null
null
GHSA-7x5p-5275-mmvg
In the Linux kernel, the following vulnerability has been resolved:mm/page_alloc: don't call pfn_to_page() on possibly non-existent PFN in split_large_buddy()In split_large_buddy(), we might call pfn_to_page() on a PFN that might not exist. In corner cases, such as when freeing the highest pageblock in the last memory section, this could result with CONFIG_SPARSEMEM && !CONFIG_SPARSEMEM_EXTREME in __pfn_to_section() returning NULL and and __section_mem_map_addr() dereferencing that NULL pointer.Let's fix it, and avoid doing a pfn_to_page() call for the first iteration, where we already have the page.So far this was found by code inspection, but let's just CC stable as the fix is easy.
[]
null
5.5
null
null
null
CVE-2007-3771
Stack-based buffer overflow in the Internet E-mail Auto-Protect feature in Symantec AntiVirus Corporate Edition before 10.1, and Client Security before 3.1, allows local users to cause a denial of service (service crash) via a long (1) To, (2) From, or (3) Subject header in an outbound SMTP e-mail message. NOTE: the original vendor advisory referenced CVE-2006-3456, but this was an error.
[ "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1000:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1000:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1007:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2024-5086
Essential Addons for Elementor PRO – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.8.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Team Member Carousel Widget
The Essential Addons for Elementor PRO – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Team Member Carousel widget in all Pro versions up to, and including, 5.8.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-32p8-xhh6-v239
SQL injection vulnerability in index.php in the Quiz (com_quiz) 0.81 and earlier component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the tid parameter in a user_tst_shw action.
[]
null
null
null
null
null
GHSA-c86m-jfmr-j98w
IBM WebSphere MQ 7.5, 8.0, and 9.0 could allow a remotely authenticated attacker to to send invalid or malformed headers that could cause messages to no longer be transmitted via the affected channel. IBM X-Force ID: 141339.
[]
null
null
4.3
null
null
CVE-2013-3295
Directory traversal vulnerability in install/popup.php in Exponent CMS before 2.2.0 RC1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.
[ "cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2014-5940
The PocketPC.ch (aka com.tapatalk.pocketpcch) application 3.9.51 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:pocketpc:pocketpc.ch:3.9.51:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-jxg7-cghf-mggx
Jenkins VMware Lab Manager Slaves Plugin vulnerable to Improper Certificate Validation
VMware Lab Manager Slaves Plugin unconditionally disables SSL/TLS certificate validation for the entire Jenkins controller JVM.As of publication of this advisory, there is no fix.
[]
null
6.5
null
null
null
CVE-2023-41695
WordPress Analytify plugin <= 5.1.0 - Broken Access Control vulnerability
Missing Authorization vulnerability in Analytify Analytify allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Analytify: from n/a through 5.1.0.
[]
null
3.5
null
null
null
CVE-2024-3524
Campcodes Online Event Management System process.php cross site scripting
A vulnerability, which was classified as problematic, has been found in Campcodes Online Event Management System 1.0. This issue affects some unknown processing of the file /views/process.php. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259895.
[ "cpe:2.3:a:campcodes:online_event_management_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
null
GHSA-hw2r-jgp3-3h2v
On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutput request is received, the device becomes incapable of completing the pairing process. A third party can inject a second PairReqNoInputNoOutput request just after a real one, causing the pair request to be blocked.
[]
null
4.3
null
null
null
CVE-2016-4928
Cross site request forgery vulnerability in Junos Space before 15.2R2 allows remote attackers to perform certain administrative actions on Junos Space.
[ "cpe:2.3:o:juniper:junos_space:*:r1:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2006-6653
The accept function in NetBSD-current before 20061023, NetBSD 3.0 and 3.0.1 before 20061024, and NetBSD 2.x before 20061029 allows local users to cause a denial of service (socket consumption) via an invalid (1) name or (2) namelen parameter, which may result in the socket never being closed (aka "a dangling socket").
[ "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:current:*:*:*:*:*:*:*" ]
null
null
null
1.7
null
GHSA-8mph-q733-2v79
Directory traversal vulnerability in include/inc_ext/spaw/spaw_control.class.php in phpwcms 1.2.5-DEV allows remote attackers to include arbitrary local files via .. (dot dot) sequences in the spaw_root parameter. NOTE: CVE analysis suggests that this issue is actually in SPAW Editor PHP Edition.
[]
null
null
null
null
null
CVE-2024-56965
An issue in Shanghai Shizhi Information Technology Co., Ltd Shihuo iOS 8.16.0 allows attackers to access sensitive user information via supplying a crafted link.
[]
null
6.5
null
null
null
CVE-2020-17363
USVN (aka User-friendly SVN) before 1.0.9 allows remote code execution via shell metacharacters in the number_start or number_end parameter to LastHundredRequest (aka lasthundredrequestAction) in the Timeline module. NOTE: this may overlap CVE-2020-25069.
[ "cpe:2.3:a:usvn:usvn:*:*:*:*:*:*:*:*" ]
null
9.9
null
9
null
GHSA-5grf-cv3x-c266
An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 106, Firefox ESR < 102.6, and Thunderbird < 102.6.
[]
null
8.8
null
null
null
CVE-2021-27971
Alps Alpine Touchpad Driver 10.3201.101.215 is vulnerable to DLL Injection.
[ "cpe:2.3:a:alpsalpine:touchpad_driver:10.3201.101.215:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
GHSA-h552-pj49-gv49
Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
null
7.5
null
null
CVE-2020-0901
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*" ]
null
9.8
null
7.5
null
GHSA-gvh6-x6fv-8cqf
AdRem NetCrunch 10.6.0.4587 has a stored Cross-Site Scripting (XSS) vulnerability in the NetCrunch web client. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript code in the context of the user's browser if the victim opens or searches for a node whose "Display Name" contains an XSS payload.
[]
null
5.4
null
null
null
GHSA-gjqp-7xq4-7mr3
Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002.
[]
null
null
null
null
null
RHSA-2020:4174
Red Hat Security Advisory: rh-mariadb102-mariadb and rh-mariadb102-galera security and bug fix update
mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.8
3.7
null
null
GHSA-5mwf-gcw7-jrpc
An issue was discovered in Arcserve Unified Data Protection (UDP) through 6.5 Update 4. There is a DDI-VRT-2018-19 Unauthenticated XXE in /management/UdpHttpService issue.
[]
null
null
7.5
null
null
CVE-2025-1145
NetVision Information ISOinsight - Reflected Cross-site Scripting
NetVision Information ISOinsight has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript code in the user's browser through phishing techniques.
[]
null
6.1
null
null
null
CVE-2023-24047
An Insecure Credential Management issue discovered in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges via use of weak hashing algorithm.
[ "cpe:2.3:o:connectize:ac21000_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:connectize:ac21000_g6_firmware:641.139.1.1256:*:*:*:*:*:*:*", "cpe:2.3:h:connectize:ac21000_g6:-:*:*:*:*:*:*:*" ]
null
8
null
null
null
CVE-2003-1106
The SMTP service in Microsoft Windows 2000 before SP4 allows remote attackers to cause a denial of service (crash or hang) via an e-mail message with a malformed time stamp in the FILETIME attribute.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2017-11330
The DivFixppCore::avi_header_fix function in DivFix++Core.cpp in DivFix++ v0.34 allows remote attackers to cause a denial of service (invalid memory write and application crash) via a crafted avi file.
[ "cpe:2.3:a:divfix:divfix\\+\\+:0.34:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2022-23004
Algorithm incorrectly returning error and Invalid unreduced value written to output buffer
When computing a shared secret or point multiplication on the NIST P-256 curve using a public key with an X coordinate of zero, an error is returned from the library, and an invalid unreduced value is written to the output buffer. This may be leveraged by an attacker to cause an error scenario, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.
[ "cpe:2.3:a:westerndigital:sweet_b:1:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2024-3115
Exposure of Sensitive Information to an Unauthorized Actor in GitLab
An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to access issues and epics without having an SSO session using Duo Chat.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*" ]
null
4.3
null
null
null