id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-vg2h-939c-4p88
|
The vCenter Server contains a denial-of-service vulnerability in VPXD service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to create a denial of service condition due to excessive memory consumption by VPXD service.
|
[] | null | null | null | null | null |
|
RHSA-2020:1276
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.10 openshift security update
|
kubernetes: crafted requests to kubelet API allow for memory exhaustion
|
[
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 4.3 | null | null | null |
CVE-2014-3808
|
Multiple cross-site scripting (XSS) vulnerabilities in BarracudaDrive before 6.7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) role parameter to roles.lsp, (2) name parameter to user.lsp, (3) path parameter to wizard/setuser.lsp, (4) host parameter to tunnelconstr.lsp, or (5) newpath parameter to wfsconstr.lsp in rtl/protected/admin/.
|
[
"cpe:2.3:a:barracudadrive:barracudadrive:*:*:*:*:*:*:*:*",
"cpe:2.3:a:barracudadrive:barracudadrive:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:barracudadrive:barracudadrive:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:barracudadrive:barracudadrive:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:barracudadrive:barracudadrive:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:barracudadrive:barracudadrive:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:barracudadrive:barracudadrive:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:barracudadrive:barracudadrive:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:realtimelogic:barracudadrive:6.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-v8qg-q79m-vp4q
|
An issue existed with authenticating the action triggered by an NFC tag. The issue was addressed with improved action authentication. This issue is fixed in iOS 14.5 and iPadOS 14.5. A person with physical access to an iOS device may be able to place phone calls to any phone number.
|
[] | null | null | null | null | null |
|
CVE-2016-6103
|
IBM Tivoli Key Lifecycle Manager 2.5 and 2.6 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
|
[
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.2:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-v2q7-558q-p2qh
|
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0200 and CVE-2016-3211.
|
[] | null | null | 8.8 | null | null |
|
GHSA-8q4v-7g6c-59xv
|
A vulnerability, which was classified as critical, was found in code-projects Voting System 1.0. Affected is an unknown function of the file /admin/voters_edit.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2.1 | 6.3 | null | null | null |
|
CVE-2024-57726
|
SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
|
[] | null | 9.9 | null | null | null |
|
GHSA-xmpc-wq83-gmwh
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor Pro allows Stored XSS.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2025:3388
|
Red Hat Security Advisory: python-jinja2 security update
|
jinja2: Jinja sandbox breakout through attr filter selecting format method
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null | null |
CVE-2023-34407
|
OfflinePlayerService.exe in Harbinger Offline Player 4.0.6.0.2 allows directory traversal as LocalSystem via ..\ in a URL.
|
[
"cpe:2.3:a:harbingergroup:office_player:4.0.6.0.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-63f6-cjxm-wf36
|
Windows Remote Access Connection Manager Information Disclosure Vulnerability
|
[] | null | 4.7 | null | null | null |
|
GHSA-76q4-7268-9v4c
|
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function FileStream::makeSubStream() located in Stream.cc. It allows an attacker to cause Denial of Service.
|
[] | null | null | null | null | null |
|
CVE-2017-16952
|
KMPlayer 4.2.2.4 allows remote attackers to cause a denial of service via a crafted NSV file.
|
[
"cpe:2.3:a:kmplayer:kmplayer:4.2.2.4:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-rwjj-72mq-wxxc
|
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.
|
[] | null | null | 7.8 | null | null |
|
GHSA-55jr-mfpr-5vwv
|
A privilege escalation vulnerability may enable a service account to elevate its privileges.The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account.It is important to note that no such vector has been identified in this instance.
|
[] | 7.3 | 7 | null | null | null |
|
GHSA-h4vj-jq9j-frqv
|
The OG access fields (visibility fields) implementation in Organic Groups (OG) module 7.x-2.x before 7.x-2.3 for Drupal does not properly restrict access to private groups, which allows remote authenticated users to guess node IDs, subscribe to, and read the content of arbitrary private groups via unspecified vectors.
|
[] | null | 4.3 | null | null | null |
|
GHSA-2882-xfpf-chqj
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aelora iframe Wrapper allows DOM-Based XSS. This issue affects iframe Wrapper: from n/a through 0.1.1.
|
[] | null | 6.5 | null | null | null |
|
GHSA-g4hp-jhhg-h69g
|
Many fields for the web configuration interface of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to execute arbitrary SQL commands because the values are insufficiently neutralized.
|
[] | 5.3 | null | null | null | null |
|
GHSA-8379-j3pg-g4h6
|
The Send PDF for Contact Form 7 WordPress plugin before 0.9.9.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[] | null | 5.4 | null | null | null |
|
GHSA-9j2r-7wv5-9gxw
|
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects DGN2200v4 before 1.0.0.110, DGND2200Bv4 before 1.0.0.109, R7300 before 1.0.0.70, R8300 before 1.0.2.130, and R8500 before 1.0.2.130.
|
[] | null | null | null | null | null |
|
GHSA-vv24-q5rx-p823
|
SQL injection vulnerability in search.asp in JGBBS 3.0 Beta 1 allows remote attackers to execute arbitrary SQL commands via the author parameter.
|
[] | null | null | null | null | null |
|
CVE-2024-10684
|
Kognetiks Chatbot for WordPress <= 2.1.7 - Reflected Cross-Site Scripting
|
The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dir' parameter in all versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:kognetiks:kognetiks_chatbot:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
GHSA-43wf-2r84-wc92
|
Microsoft SQL Server 2000 SP2, when configured as a distributor, allows attackers to execute arbitrary code via the @scriptfile parameter to the sp_MScopyscript stored procedure.
|
[] | null | null | null | null | null |
|
GHSA-v5gj-fx3g-hcpw
|
SQL injection in Apache Submarine
|
Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a user logs in. This issue can result in unauthorized login.Now we have fixed this issue and now user must have the correct login to access workbench. This issue affects Apache Submarine: from 0.7.0 before 0.8.0. We recommend that all submarine users with 0.7.0 upgrade to 0.8.0, which not only fixes the issue, supports the oidc authentication mode, but also removes the case of unauthenticated logins.If using the version lower than 0.8.0 and not want to upgrade, you can try cherry-pick PR https://github.com/apache/submarine/pull/1037 https://github.com/apache/submarine/pull/1054 and rebuild the submarine-server image to fix this.
|
[] | null | 9.8 | null | null | null |
GHSA-2mqq-6v49-g869
|
Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-9092
|
Hybrid Module Deployment in Multi-JVM Environments Leading to Resource Exhaustion
|
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0 bc-fips (API modules) allows Excessive Allocation. This vulnerability is associated with program files org.Bouncycastle.Crypto.Fips.NativeLoader.
This issue affects Bouncy Castle for Java - BC-FJA 2.1.0: from BC-FJA 2.1.0 through 2.1.0.
|
[] | 1 | null | null | null | null |
CVE-2025-54294
|
Extension - stackideas.com - SQLi vulnerability in Komento component 4.0.0-4.0.7 for Joomla
|
A SQLi vulnerability in Komento component 4.0.0-4.0.7for Joomla was discovered. The issue allows unprivileged users to execute arbitrary SQL commands.
|
[] | 9.3 | null | null | null | null |
GHSA-mpx7-h62m-5fwv
|
An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted messages, an attacker can cause a NULL pointer dereference, which can cause the product to crash.
|
[] | null | null | 6.5 | null | null |
|
GHSA-wj4w-gqp4-cp2c
|
Format string vulnerability in the -a option (daemon mode) in Proxytunnel before 1.2.3 allows remote attackers to execute arbitrary code via format string specifiers in an invalid proxy answer.
|
[] | null | null | null | null | null |
|
GHSA-x6gj-2vp8-jhcw
|
Adobe InDesign version 16.0 (and earlier) is affected by an Out-of-bounds Write vulnerability in the CoolType library. An unauthenticated attacker could leverage this vulnerability to achieve remote code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | null | null | null | null |
|
CVE-2008-5731
|
The PGPwded device driver (aka PGPwded.sys) in PGP Corporation PGP Desktop 9.0.6 build 6060 and 9.9.0 build 397 allows local users to cause a denial of service (system crash) and possibly gain privileges via a certain METHOD_BUFFERED IOCTL request that overwrites portions of memory, related to a "Driver Collapse." NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:pgp:desktop:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pgp:desktop:9.9.0:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
GHSA-25m3-g4xm-g7jw
|
The DEC UDK processing feature in the hanterm (hanterm-xf) terminal emulator before 2.0.5 allows attackers to cause a denial of service via a certain character escape sequence that causes the terminal to enter a tight loop.
|
[] | null | null | null | null | null |
|
CVE-2021-20016
|
A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x.
|
[
"cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:sma_500v:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-cj2f-mfq7-3wfr
|
The Device Sensor feature in Cisco IOS 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via a DHCP packet, aka Bug ID CSCty96049.
|
[] | null | null | null | null | null |
|
GHSA-9c2q-6mfx-w35r
|
Missing Authorization vulnerability in AA Web Servant 12 Step Meeting List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects 12 Step Meeting List: from n/a through 3.16.5.
|
[] | null | 6.5 | null | null | null |
|
GHSA-h7hm-72pg-fq5f
|
Buffer overflows in Raytheon SilentRunner allow remote attackers to (1) cause a denial of service in the collector (cle.exe) component of SilentRunner 2.0 via traffic containing long passwords, or (2) execute arbitrary commands via long HTTP queries in the Knowledge Browser component in SilentRunner 2.0 and 2.0.1. NOTE: It is highly likely that this candidate will be split into multiple candidates.
|
[] | null | null | null | null | null |
|
CVE-2021-21425
|
Unauthenticated Arbitrary YAML Write/Update leads to Code Execution
|
Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in arbitrary YAML file creation or content change of existing YAML files on the system. Successfully exploitation of that vulnerability results in configuration changes, such as general site information change, custom scheduler job definition, etc. Due to the nature of the vulnerability, an adversary can change some part of the webpage, or hijack an administrator account, or execute operating system command under the context of the web-server user. This vulnerability is fixed in version 1.10.8. Blocking access to the `/admin` path from untrusted sources can be applied as a workaround.
|
[
"cpe:2.3:a:getgrav:grav-plugin-admin:*:*:*:*:*:*:*:*"
] | null | 9.3 | null | null | null |
GHSA-4x4q-c47m-2xv4
|
FUSE 2.x before 2.3.0 does not properly clear previously used memory from unfilled pages when the filesystem returns a short byte count to a read request, which may allow local users to obtain sensitive information.
|
[] | null | null | null | null | null |
|
GHSA-4vrf-7x42-9ggg
|
TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
|
[] | null | 7.5 | null | null | null |
|
GHSA-3r3g-g73x-g593
|
coreos-installer improperly verifies GPG signature when decompressing gzipped artifact
|
Impactcoreos-installer fails to correctly verify GPG signatures when decompressing gzip-compressed artifacts. This allows bypass of signature verification in cases where coreos-installer decompresses a downloaded OS image, allowing an attacker who can modify the OS image to compromise a newly-installed system.Default installations from ISO or PXE media in Fedora CoreOS, RHEL CoreOS, and RHEL for Edge are **not** affected, as coreos-installer installs from an OS image shipped as part of the install media.These flows are affected:Installing with `--image-file`, `--image-url`, or `coreos.inst.image_url`. For example, if a user has a local mirror of installation images, an attacker could replace an image with a gzip-compressed alternative (even if the file extension is `.xz`). The result:Notice that GPG reports a bad signature, but coreos-installer continues anyway. Automation that relies on coreos-installer's exit status will not notice either.`coreos-installer download --decompress --image-url`:Again, coreos-installer reports success.Installing with default parameters, when **not** installing from the image built into live ISO or PXE media, if the hosting service is compromised or if an active attacker gains control of the HTTPS response.`coreos-installer download --decompress` if the hosting service is compromised or if an active attacker gains control of the HTTPS response.PatchesThe vulnerability is [fixed](https://github.com/coreos/coreos-installer/pull/659) in coreos-installer 0.10.1.WorkaroundsFor `coreos-installer download`, do not use the `-d` or `--decompress` options.For `coreos-installer install`, manually inspect the stderr output. If `BAD signature` appears, do not boot from the target disk. Note, however, that some OS services may have already accessed data on the compromised disk.ReferencesFor more information, see [PR 655](https://github.com/coreos/coreos-installer/pull/655).For more informationIf you have any questions or comments about this advisory, [open an issue in coreos-installer](https://github.com/coreos/coreos-installer/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/[email protected]/).
|
[] | null | 7.8 | null | null | null |
CVE-2021-45645
|
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects RBS50Y before 2.7.0.122, SRK60 before 2.7.0.122, SRR60 before 2.7.0.122, SRS60 before 2.7.0.122, SXK30 before 3.2.33.108, SXR30 before 3.2.33.108, SXS30 before 3.2.33.108, and SRC60 before 2.7.0.122.
|
[
"cpe:2.3:o:netgear:rbs50y_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:srk60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srk60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:srr60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srr60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:srs60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srs60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:sxk30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:sxk30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:sxr30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:sxr30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:sxs30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:sxs30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:src60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:src60:-:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-359p-x9w8-8g33
|
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2016-6545
|
iTrack Easy does not use session cookies to maintain sessions and POSTs the users password over HTTPS for each request
|
Session cookies are not used for maintaining valid sessions in iTrack Easy. The user's password is passed as a POST parameter over HTTPS using a base64 encoded passwd field on every request. In this implementation, sessions can only be terminated when the user changes the associated password.
|
[
"cpe:2.3:a:ieasytec:itrackeasy:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 | null |
CVE-2006-1652
|
Multiple buffer overflows in (a) UltraVNC (aka Ultr@VNC) 1.0.1 and earlier and (b) tabbed_viewer 1.29 (1) allow user-assisted remote attackers to execute arbitrary code via a malicious server that sends a long string to a client that connects on TCP port 5900, which triggers an overflow in Log::ReallyPrint; and (2) allow remote attackers to cause a denial of service (server crash) via a long HTTP GET request to TCP port 5800, which triggers an overflow in VNCLog::ReallyPrint.
|
[
"cpe:2.3:a:ultravnc:tabbed_viewer:1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ultravnc:vnc_viewer:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
CVE-2013-3761
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products Portal 9.1 and PeopleTools 8.52 allows remote attackers to affect integrity via vectors related to PIA Core Technology.
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:9.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-4hfw-prwp-gw3q
|
The ESRI ArcGis Runtime SDK before 10.2.6-2 for Android might allow attackers to execute arbitrary code by leveraging a finalize method in a Serializable class that improperly passes an attacker-controlled pointer to a native function.
|
[] | null | null | 9.8 | null | null |
|
GHSA-868w-34vr-f4r2
|
Multiple SQL injection vulnerabilities in ManageEngine Applications Manager 9.x and 10.x allow remote attackers to execute arbitrary SQL commands via the (1) viewId parameter to fault/AlarmView.do or (2) period parameter to showHistoryData.do.
|
[] | null | null | null | null | null |
|
PYSEC-2020-287
| null |
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption. The issue is patched in commit 2d88f470dea2671b430884260f3626b1fe99830a, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
|
[] | null | null | null | null | null |
GHSA-rghf-m847-v399
|
TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the ifname parameter in the get_apcli_conn_info function.
|
[] | null | 8.8 | null | null | null |
|
GHSA-qcg4-w26w-fjv8
|
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services? Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1181, CVE-2019-1182, CVE-2019-1222.
|
[] | null | null | null | null | null |
|
CVE-2022-32475
|
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the VariableRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This issue was fixed in the kernel, which also protected chipset and OEM chipset code.
|
[
"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
CVE-2023-3497
|
Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | null | null |
|
CVE-2019-1010193
|
hisiphp 1.0.8 is affected by: Cross Site Scripting (XSS).
|
[
"cpe:2.3:a:hisiphp:hisiphp:1.0.8:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2020-25362
|
The id paramater in Online Shopping Alphaware 1.0 has been discovered to be vulnerable to an Error-Based blind SQL injection in the /alphaware/details.php path. This allows an attacker to retrieve all databases.
|
[
"cpe:2.3:a:online_shopping_alphaware_project:online_shopping_alphaware:1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-39523
|
Junos OS Evolved: CLI parameter processing issue allows privilege escalation
|
An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system.
The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level.
This issue affects Junos OS Evolved:
* All versions before 20.4R3-S7-EVO,
* 21.2-EVO versions before 21.2R3-S8-EVO,
* 21.4-EVO versions before 21.4R3-S7-EVO,
* 22.1-EVO versions before 22.1R3-S6-EVO,
* 22.2-EVO versions before 22.2R3-EVO,
* 22.3-EVO versions before 22.3R2-EVO,
* 22.4-EVO versions before 22.4R2-EVO.
|
[
"cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_os_evolved:22.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*"
] | 8.5 | 7.8 | null | null | null |
GHSA-rrvc-482f-wgjh
|
The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
|
[] | null | null | null | null | null |
|
CVE-2017-12144
|
In ytnef 1.9.2, an allocation failure was found in the function TNEFFillMapi in ytnef.c, which allows attackers to cause a denial of service via a crafted file.
|
[
"cpe:2.3:a:ytnef_project:ytnef:1.9.2:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-5fv9-2vmx-f4m6
|
A vulnerability classified as problematic has been found in romadebrian WEB-Sekolah 1.0. Affected is an unknown function of the file /Admin/akun_edit.php of the component Backend. The manipulation of the argument kode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 2.4 | null | null | null |
|
GHSA-75qx-jx75-r768
|
PHP remote file inclusion vulnerability in help/index.php in The Merchant (themerchant) 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the show parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-21115
|
In btm_sec_encrypt_change of btm_sec.cc, there is a possible way to downgrade the link key type due to improperly used crypto. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-258834033
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2008-2563
|
Multiple cross-site scripting (XSS) vulnerabilities in (1) dsp_main.php and (2) dsp_task_editor.php in SamTodo 1.1 allow remote attackers to inject arbitrary web script or HTML via the (a) tid parameter in a main.taskeditor edit action, and the (b) completed parameter in a main.default action, to index.php.
|
[
"cpe:2.3:a:samtodo:samtodo:1.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-qrr7-x4mg-wh68
|
The MIMO Woocommerce Order Tracking plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add, update, and delete shipper tracking settings.
|
[] | null | 4.3 | null | null | null |
|
CVE-2015-7044
|
The System Integrity Protection feature in Apple OS X before 10.11.2 mishandles union mounts, which allows attackers to execute arbitrary code in a privileged context via a crafted app with root privileges.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 7.6 | null |
|
GHSA-f288-gj5f-5j7f
|
A vulnerability was found in SourceCodester Company Website CMS. It has been declared as critical. This vulnerability affects unknown code of the file /dashboard/add-blog.php of the component Add Blog. The manipulation of the argument ufile leads to unrestricted upload. The attack can be initiated remotely. VDB-205882 is the identifier assigned to this vulnerability.
|
[] | null | 9.8 | null | null | null |
|
CVE-2013-3065
|
Cross-site scripting (XSS) vulnerability in the Parental Controls section in Linksys EA6500 with firmware 1.1.28.147876 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to the Blocked Specific Sites section.
|
[
"cpe:2.3:o:linksys:ea6500_firmware:1.1.28.147876:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:ea6500:-:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
ICSA-18-263-02
|
Rockwell Automation RSLinx Classic
|
This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.CVE-2018-14829 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.CVE-2018-14821 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.CVE-2018-14827 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
|
[] | null | null | 8.6 | null | null |
CVE-2009-4411
|
The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.
|
[
"cpe:2.3:a:xfs:acl:2.2.47:*:*:*:*:*:*:*"
] | null | null | null | 3.7 | null |
|
GHSA-mrvw-5jm3-7j8x
|
An issue in Brainasoft Braina v2.8 allows a remote attacker to obtain sensitive information via the chat window function.
|
[] | null | 7.5 | null | null | null |
|
GHSA-jrhx-25h4-vwxj
|
WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to bypass intended restrictions on outbound connections to "non-default TCP ports" via a crafted port number, related to an "integer truncation issue." NOTE: this may overlap CVE-2010-1099.
|
[] | null | null | null | null | null |
|
GHSA-9h5m-6q6q-76qg
|
Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_cert_file/` API is affected by command injection vulnerability.
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-11744
|
In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module.
|
[
"cpe:2.3:a:modx:modx_revolution:2.5.7:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-5vv4-4cpw-9c7v
|
In vow, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494473; Issue ID: ALPS07494473.
|
[] | null | 6.4 | null | null | null |
|
CVE-2019-16891
|
Liferay Portal CE 6.2.5 allows remote command execution because of deserialization of a JSON payload.
|
[
"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.1.0:b1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.1.0:b2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.1.0:b3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.1.0:b4:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.1.0:ga1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.1.0:rc1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.1.1:ga2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.1.2:ga3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:b1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:b2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:ga1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:m1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:m2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:m3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:m4:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:m5:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:m6:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:rc1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:rc2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:rc3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:rc4:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:rc5:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.0:rc6:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.1:ga2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.2:ga3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.3:ga4:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.4:ga5:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:6.2.5:ga6:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:a1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:a2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:a3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:a4:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:a5:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:b1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:b2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:b3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:b4:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:b5:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:b6:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:b7:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:ga1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:m1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:m2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:m3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:m4:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:m5:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:m6:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.0:m7:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.1:ga2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.2:ga3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.3:ga4:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.4:ga5:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.5:ga6:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.0.6:ga7:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.0:a1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.0:a2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.0:b1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.0:b2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.0:b3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.0:ga1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.0:m1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.0:m2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.0:rc1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.1:ga2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.2:ga3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.1.3:ga4:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.2.0:alpha1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.2.0:beta1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.2.0:beta2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.2.0:beta3:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.2.0:m2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.2.0:rc1:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.2.0:rc2:*:*:community:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.2.0:rc3:*:*:community:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-hc6p-h2f4-m5h5
|
WebKit in Apple Safari before 6.0 does not properly handle drag-and-drop events, which allows user-assisted remote attackers to obtain sensitive information about full pathnames via a crafted web site.
|
[] | null | null | null | null | null |
|
CVE-2024-22717
|
Cross Site Scripting (XSS) vulnerability in Form Tools 3.1.1 allows attackers to run arbitrary code via the First Name field in the application.
|
[] | null | 6.1 | null | null | null |
|
GHSA-cjmf-w3gw-6j54
|
In the Linux kernel, the following vulnerability has been resolved:usb: renesas: Fix refcount leak bugIn usbhs_rza1_hardware_init(), of_find_node_by_name() will return
a node pointer with refcount incremented. We should use of_node_put()
when it is not used anymore.
|
[] | null | null | null | null | null |
|
GHSA-v2mv-99jp-98vc
|
An improper validation of integrity check value vulnerability [CWE-354] in FortiNDR version 7.4.2 and below, version 7.2.1 and below, version 7.1.1 and below, version 7.0.6 and below may allow an authenticated attacker with at least Read/Write permission on system maintenance to install a corrupted firmware image.
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-46049
|
LLVM 15.0.0 has a NULL pointer dereference in the parseOneMetadata() function via a crafted pdflatex.fmt file (or perhaps a crafted .o file) to llvm-lto. NOTE: this is disputed because the relationship between pdflatex.fmt and any LLVM language front end is not explained, and because a crash of the llvm-lto application should be categorized as a usability problem.
|
[] | null | 5.3 | null | null | null |
|
RHSA-2023:3725
|
Red Hat Security Advisory: less security update
|
less: crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null | null |
GHSA-p999-w4h4-238v
|
The fix in Kibana for ESA-2017-23 was incomplete. With X-Pack security enabled, Kibana versions before 6.1.3 and 5.6.7 have an open redirect vulnerability on the login page that would enable an attacker to craft a link that redirects to an arbitrary website.
|
[] | null | null | 6.1 | null | null |
|
GHSA-xqrc-68p6-rf7p
|
Directory Traversal vulnerability in Sitecore Experience Platform through 10.2 allows remote attackers to download arbitrary files via crafted command to download.aspx
|
[] | null | 7.5 | null | null | null |
|
GHSA-f7gq-h8jv-h3cq
|
ash_authentication_phoenix has Insufficient Session Expiration
|
ImpactSession tokens remain valid on the server after user logout, creating a security gap where:Compromised tokens (via XSS, network interception, or device theft) continue to work even after the user logs outThe sessions stored in the database still expire, limiting the duration during which this could be exploitedUsers cannot fully invalidate their sessions when logging out from shared or potentially compromised devicesby default, changing one's password *does* invalidate all other sessions, so changing your password as a security measure would have been effectiveMay cause compliance issues with security frameworks requiring complete sessionPatchesUpgrade to version 2.10.0. After upgrading, users must update their AuthController implementation to use the new `clear_session/2` function with their OTP app name. You will be prompted to do so with a compile-time error.If you do not have the setting `require_token_presence_for_authentication?` set to `true` in the `tokens` section, you will see a separate error:In order to revoke sessions on log out when not storing tokens directly in the session, we must have some unique identifier with which to do so. You should prefer to enable `require_token_presence_for_authentication?` if possible, instead of setting this to `:jti`. Note that whatever you do here, if you did not previously have `require_token_presence_for_authentication?` set to `true`, setting it to `true` *or* setting `authentication.session_identifier` to `:jti` will log out all of your currently authenticated users.WorkaroundsYou can manually revoke tokens in your `logout/2` handler in your auth controller.
|
[] | 2.3 | null | null | null | null |
CVE-2024-3944
|
WP To Do <= 1.3.0 - Authenticated (Admin+) Stored Cross-Site Scripting via Task Comments
|
The WP To Do plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Comment in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
[
"cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*"
] | null | 4.4 | null | null | null |
GHSA-hr65-qq6p-87r4
|
Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch
|
In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.
|
[] | null | 5.3 | null | null | null |
CVE-2017-10353
|
Vulnerability in the Oracle Hospitality Hotel Mobile component of Oracle Hospitality Applications (subcomponent: Suite8/RESTAPI). The supported version that is affected is 1.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Hotel Mobile. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Hotel Mobile accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality Hotel Mobile. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L).
|
[
"cpe:2.3:a:oracle:hospitality_hotel_mobile:1.1:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.5 | null |
|
GHSA-f2c9-5jqw-3xh3
|
Cross-Site Scripting in Qiita-Markdown
|
Increments Qiita-Markdown before 0.33.0 allows XSS in transformers.
|
[] | null | 6.1 | null | null | null |
GHSA-pgmv-hx9g-jjhf
|
OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution
|
[] | null | 7.8 | null | null | null |
|
CVE-2005-1555
|
Cross-site scripting (XSS) vulnerability in the JRun Web Server in ColdFusion MX 7.0 allows remote attackers to inject arbitrary script or HTML via the URL, which is not properly quoted in the resulting default 404 error page.
|
[
"cpe:2.3:a:macromedia:coldfusion:7.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-rw8g-79g2-chq8
|
Microsoft Office Graphics Remote Code Execution Vulnerability.
|
[] | null | 7.8 | null | null | null |
|
CVE-2019-0024
|
Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu
|
A persistent cross-site scripting (XSS) vulnerability in the Email Collectors menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
|
[
"cpe:2.3:o:juniper:advanced_threat_prevention:*:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:atp400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:atp700:-:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
CVE-2018-7836
|
An unrestricted Upload of File with Dangerous Type vulnerability exists on numerous methods of the IIoT Monitor 3.1.38 software that could allow upload and execution of malicious files.
|
[
"cpe:2.3:a:schneider-electric:iiot_monitor:3.1.38:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2023-24983
|
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19805)
|
[
"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
RHSA-2023:6368
|
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
|
QEMU: hcd-ehci: DMA reentrancy issue (incomplete fix for CVE-2021-3750)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null | null |
GHSA-fxx9-q7vv-g6p2
|
In the Linux kernel, the following vulnerability has been resolved:null_blk: fix validation of block sizeBlock size should be between 512 and PAGE_SIZE and be a power of 2. The current
check does not validate this, so update the check.Without this patch, null_blk would Oops due to a null pointer deref when
loaded with bs=1536 [1].[axboe: remove unnecessary braces and != 0 check]
|
[] | null | 5.5 | null | null | null |
|
RHSA-2005:598
|
Red Hat Security Advisory: sysreport security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
CVE-2022-47521
|
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-rp9c-7g4x-v5p2
|
drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
|
[] | null | null | 7.8 | null | null |
|
GHSA-qcp2-72pg-qp7r
|
In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed
|
[] | null | 5.5 | null | null | null |
|
CVE-2021-3508
|
A flaw was found in PDFResurrect in version 0.22b. There is an infinite loop in get_xref_linear_skipped() in pdf.c via a crafted PDF file.
|
[
"cpe:2.3:a:pdfresurrect_project:pdfresurrect:0.22b:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.