id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-83f3-7299-2mv4
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
GHSA-g385-472x-mccv
|
PHP remote file inclusion vulnerability in espaces/communiques/annotations.php in C-Arbre 0.6PR7 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter, a different vector than CVE-2007-1721.
|
[] | null | null | null | null | null |
|
RHSA-2023:1065
|
Red Hat Security Advisory: pesign security update
|
pesign: Local privilege escalation on pesign systemd service
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null | null |
GHSA-wmpv-c2jp-j2xg
|
ERC1155Supply vulnerability in OpenZeppelin Contracts
|
When ERC1155 tokens are minted, a callback is invoked on the receiver of those tokens, as required by the spec. When including the `ERC1155Supply` extension, total supply is not updated until after the callback, thus during the callback the reported total supply is lower than the real number of tokens in circulation.ImpactIf a system relies on accurately reported supply, an attacker may be able to mint tokens and invoke that system after receiving the token balance but before the supply is updated.PatchesA fix is included in version 4.3.3 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.WorkaroundsIf accurate supply is relevant, do not mint tokens to untrusted receivers.CreditsThe issue was identified and reported by @ChainSecurityAudits.For more informationRead [TotalSupply Inconsistency in ERC1155 NFT Tokens](https://medium.com/chainsecurity/totalsupply-inconsistency-in-erc1155-nft-tokens-8f8e3b29f5aa) by @ChainSecurityAudits for a more detailed breakdown.If you have any questions or comments about this advisory, email us at [email protected].
|
[] | null | null | null | null | null |
CVE-2020-7696
|
Information Exposure
|
This affects all versions of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
|
[
"cpe:2.3:a:react-native-fast-image_project:react-native-fast-image:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-4m9f-x84m-j5w6
|
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32451104. References: QC-CR#1087797.
|
[] | null | null | 7 | null | null |
|
CVE-2021-38974
|
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to cause a denial of service using specially crafted HTTP requests. IBM X-Force ID: 212779.
|
[
"cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
|
GHSA-gv7h-mw85-m8mp
|
TurnkeyForms Local Classifieds allows remote attackers to bypass authentication and gain administrative access via a direct request to Site_Admin/admin.php.
|
[] | null | null | null | null | null |
|
CVE-2019-15129
|
The Recruitment module in Humanica Humatrix 7 1.0.0.203 and 1.0.0.681 allows an unauthenticated attacker to access all candidates' files in the photo folder on the website by specifying a "user id" parameter and file name, such as in a recruitment_online/upload/user/[user_id]/photo/[file_name] URI.
|
[
"cpe:2.3:a:humanica:humatrix_7:1.0.0.203:*:*:*:*:*:*:*",
"cpe:2.3:a:humanica:humatrix_7:1.0.0.681:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2024-10152
|
Simple Certain Time to Show Content < 1.3.1 - Reflected XSS
|
The Simple Certain Time to Show Content WordPress plugin before 1.3.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
[] | null | 7.1 | null | null | null |
GHSA-w7c2-4qqr-9227
|
An issue was discovered in Joomla! through 3.9.19. Internal read-only fields in the User table class could be modified by users.
|
[] | null | null | null | null | null |
|
CVE-2017-6335
|
The QuantumTransferMode function in coders/tiff.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a small samples per pixel value in a CMYKA TIFF file.
|
[
"cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
RHSA-2004:681
|
Red Hat Security Advisory: samba security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
GHSA-wr4w-jv29-c2wc
|
Cross-site scripting (XSS) vulnerability in admin/category.php in Zomplog 3.8.2 allows remote attackers to inject arbitrary web script or HTML via the catname parameter.
|
[] | null | null | null | null | null |
|
CVE-2018-11421
|
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. The protocol is vulnerable to remote unauthenticated disclosure of sensitive information, including the administrator's password. Under certain conditions, it's also possible to retrieve additional information, such as content of HTTP requests to the device, or the previously used password, due to memory leakages.
|
[
"cpe:2.3:o:moxa:oncell_g3150-hspa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3150-hspa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3150-hspa-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3150-hspa-t:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 | null |
|
GHSA-j7cj-m2gm-www6
|
SQL injection vulnerability in view_com.php in Nicolas Grandjean PHPMyRing 4.2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the idsite parameter.
|
[] | null | null | null | null | null |
|
GHSA-q64p-mqvp-xwq3
|
Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Product / Instrument Search). Supported versions that are affected are 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Private Banking accessible data. CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
|
[] | null | null | 4.3 | null | null |
|
GHSA-rj7h-v734-5679
|
The files_external app in ownCloud Server before 7.0.9, 8.0.x before 8.0.7, and 8.1.x before 8.1.2 allows remote authenticated users to instantiate arbitrary classes and possibly execute arbitrary code via a crafted mount point option, related to "objectstore."
|
[] | null | null | null | null | null |
|
CVE-2018-19073
|
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. They allow attackers to execute arbitrary OS commands via shell metacharacters in the modelName, by leveraging /mnt/mtd/app/config/ProductConfig.xml write access.
|
[
"cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*",
"cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*",
"cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*",
"cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 | null |
|
CVE-2017-8219
|
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.
|
[
"cpe:2.3:o:tp-link:c2_firmware:*:rel.37961n:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:c2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:c20i_firmware:*:rel.37961n:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:c20i:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-qhrp-xq7c-vp3q
|
PHP remote file inclusion vulnerability in mini-pub.php/front-end/img.php in mini-pub 0.3 allows remote attackers to execute arbitrary PHP code via a URL in the sFileName parameter.
|
[] | null | null | null | null | null |
|
CVE-2021-45494
|
Certain NETGEAR devices are affected by an attacker's ability to read arbitrary files. This affects RBK352 before 4.4.0.10, RBR350 before 4.4.0.10, and RBS350 before 4.4.0.10.
|
[
"cpe:2.3:o:netgear:rbk352_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk352:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs350:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
|
CVE-2018-21173
|
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R7500 before 1.0.0.122, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
|
[
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
|
GHSA-wj5c-qqg6-p7qc
|
The Jetpack WordPress plugin before 13.8, Jetpack Boost WordPress plugin before 3.4.8 use regexes in the Site Accelerator features when switching image URLs to their CDN counterpart. Unfortunately, some of them may match patterns it shouldn’t, ultimately making it possible for contributor and above users to perform Stored XSS attacks
|
[] | null | 5.9 | null | null | null |
|
GHSA-34wr-w2h3-hr5x
|
File Upload vulnerability in unauthenticated
session found in OpenText™ iManager 3.2.6.0200. The vulnerability could allow ant attacker to upload a
file without authentication.
|
[] | null | 5.6 | null | null | null |
|
CVE-2018-15937
|
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2011-2501
|
The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
|
[
"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-g7vr-cvwg-g92v
|
TheHostingTool (THT) 1.2.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by includes/pear/Mail/smtp.php and certain other files.
|
[] | null | null | null | null | null |
|
GHSA-6x8g-f68r-6fqp
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 4.9 | null | null |
|
CVE-2005-4055
|
SQL injection vulnerability in index.php in Cars Portal 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) page and (2) car parameters.
|
[
"cpe:2.3:a:cars_portal:cars_portal:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-g3jh-xchp-c6qc
|
A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.
|
[] | null | null | 5.9 | null | null |
|
CVE-2012-5609
|
Incomplete blacklist vulnerability in lib/migrate.php in ownCloud before 4.5.2 allows remote authenticated users to execute arbitrary PHP code by uploading a crafted mount.php file in a ZIP file.
|
[
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-6x2x-jvcm-q6gr
|
A missing authentication for critical function vulnerability [CWE-306] in FortiPresence infrastructure server before version 1.2.1 allows a remote, unauthenticated attacker to access the Redis and MongoDB instances via crafted authentication requests.
|
[] | null | 9.8 | null | null | null |
|
GHSA-grw6-5m6r-8892
|
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PSD file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
|
[] | null | null | null | null | null |
|
RHSA-2014:0189
|
Red Hat Security Advisory: mariadb55-mariadb security update
|
mysql: unspecified DoS related to Optimizer (CPU October 2013) mysql: unspecified flaw related to Replication (CPU October 2013) mysql: unspecified vulnerability related to Partition DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Error Handling DoS (CPU Jan 2014) mysql: command-line tool buffer overflow via long server version string mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB affecting integrity (CPU Jan 2014) mysql: unspecified DoS vulnerability (CPU Jan 2014) mysql: unspecified vulnerability related to Locking DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Replication DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014)
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null | null |
CVE-2013-1591
|
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
|
[
"cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:palemoon:pale_moon:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2023-1988
|
SourceCodester Online Computer and Laptop Store cross site scripting
|
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/?page=maintenance/brand. The manipulation of the argument Brand Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225536.
|
[
"cpe:2.3:a:oretnom23:online_computer_and_laptop_store:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 | null |
GHSA-pph6-grp2-wvvw
|
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40449, CVE-2021-40450.
|
[] | null | 7.8 | null | null | null |
|
GHSA-f83h-9vwx-mc3w
|
Multiple directory traversal vulnerabilities in SeedDMS (formerly LetoDMS and MyDMS) before 4.3.4 allow (1) remote authenticated users with access to the LogManagement functionality to read arbitrary files via a .. (dot dot) in the logname parameter to out/out.LogManagement.php or (2) remote attackers to write to arbitrary files via a .. (dot dot) in the fileId parameter to op/op.AddFile2.php. NOTE: vector 2 can be leveraged to execute arbitrary code by using CVE-2014-2278.
|
[] | null | null | null | null | null |
|
CVE-2025-38393
|
NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN
|
In the Linux kernel, the following vulnerability has been resolved:
NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN
We found a few different systems hung up in writeback waiting on the same
page lock, and one task waiting on the NFS_LAYOUT_DRAIN bit in
pnfs_update_layout(), however the pnfs_layout_hdr's plh_outstanding count
was zero.
It seems most likely that this is another race between the waiter and waker
similar to commit ed0172af5d6f ("SUNRPC: Fix a race to wake a sync task").
Fix it up by applying the advised barrier.
|
[] | null | null | null | null | null |
GHSA-28gw-j5j4-6f84
|
SQL injection vulnerability in editcomments.php in Bloggeruniverse Beta 2, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter and possibly other unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-289m-2964-f8q5
|
Puppet Bolt privilege escalation vulnerability
|
In Puppet Bolt versions prior to 3.27.4, a path to escalate privileges was identified.
|
[] | null | 9.8 | null | null | null |
RHSA-2024:8434
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.3 security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.9 | null | null | null |
GHSA-4hm7-73ch-vm59
|
Malicious Package in buffer-8or
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.RecommendationRemove the package from your environment. Ensure no Ethereum funds were compromised.
|
[] | null | 9.8 | null | null | null |
RHSA-2009:1207
|
Red Hat Security Advisory: nspr and nss security update
|
nss regexp heap overflow firefox/nss: doesn't handle NULL in Common Name properly deprecate MD2 in SSL cert validation (Kaminsky)
|
[
"cpe:/o:redhat:rhel_eus:5.2"
] | null | null | null | null | null |
GHSA-9fqj-q497-4x32
|
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through the specific web page.
|
[] | null | 7.2 | null | null | null |
|
CVE-2004-0810
|
Buffer overflow in Netopia Timbuktu 7.0.3 allows remote attackers to cause a denial of service (server process crash) via a certain data string that is sent to multiple simultaneous client connections to TCP port 407.
|
[
"cpe:2.3:a:netopia:timbuktu_pro_mac:6.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2021:1016
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.37 security update
|
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
|
[
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 7.5 | null | null | null |
GHSA-h8h7-r99g-m28c
|
An issue was discovered in GitLab CE/EE affecting all versions starting from 15.6 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where it was possible to disclose limited information of an exported group or project to another user.
|
[] | null | 4.1 | null | null | null |
|
CVE-2023-1188
|
FabulaTech Webcam for Remote Desktop IoControlCode ftwebcam.sys 0x222018 denial of service
|
A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42. It has been classified as problematic. Affected is the function 0x222018 in the library ftwebcam.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222360.
|
[
"cpe:2.3:a:fabulatech:webcam_for_remote_desktop:2.8.42:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 3.3 | 3.3 | 1.7 | null |
CVE-2018-1000015
|
On Jenkins instances with Authorize Project plugin, the authentication associated with a build may lack the Computer/Build permission on some agents. This did not prevent the execution of Pipeline `node` blocks on those agents due to incorrect permissions checks in Pipeline: Nodes and Processes plugin 2.17 and earlier.
|
[
"cpe:2.3:a:jenkins:pipeline_nodes_and_processes:*:*:*:*:*:jenkins:*:*"
] | null | null | 4.8 | 4.9 | null |
|
GHSA-p4wq-658h-v4f6
|
Vulnerability in the PeopleSoft Enterprise SCM eProcurement product of Oracle PeopleSoft (component: Manage Requisition Status). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM eProcurement. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM eProcurement accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM eProcurement accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
|
[] | null | null | null | null | null |
|
CVE-2019-14464
|
XMFile::read in XMFile.cpp in milkyplay in MilkyTracker 1.02.00 has a heap-based buffer overflow.
|
[
"cpe:2.3:a:milkytracker_project:milkytracker:1.02.00:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2024-6357
|
Insecure Direct Object Reference vulnerability
|
Insecure Direct Object Reference vulnerability identified in OpenText ArcSight Intelligence.
|
[
"cpe:2.3:a:opentext:arcsight_intelligence:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
CVE-2010-4801
|
Directory traversal vulnerability in admin/updatelist.php in BaconMap 1.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the filepath parameter.
|
[
"cpe:2.3:a:baconmap:baconmap:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
CVE-2021-22722
|
A CWE-79: Improper Neutralization of Input During Web Page Generation ('Stored Cross-site Scripting') vulnerability exists in EVlink City (EVC1S22P4 / EVC1S7P4 all versions prior to R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 all versions prior to R8 V3.4.0.1), and EVlink Smart Wallbox (EVB1A all versions prior to R8 V3.4.0.1 ) that could cause code injection when importing a CSV file or changing station parameters.
|
[
"cpe:2.3:o:schneider-electric:evlink_city_evc1s22p4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:evlink_city_evc1s22p4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:evlink_city_evc1s7p4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:evlink_city_evc1s7p4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:evlink_parking_evw2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:evlink_parking_evw2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:evlink_parking_evf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:evlink_parking_evf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:evlink_parking_ev.2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:evlink_parking_ev.2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:evlink_smart_wallbox_evb1a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:evlink_smart_wallbox_evb1a:-:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2024-36450
|
Cross-site scripting vulnerability exists in sysinfo.cgi of Webmin versions prior to 1.910. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a session ID may be obtained, a webpage may be altered, or a server may be halted.
|
[
"cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2018-13805
|
A vulnerability has been identified in SIMATIC ET 200SP Open Controller (All versions >= V2.0 and < V2.1.6), SIMATIC S7-1500 Software Controller (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 incl. F (All versions >= V2.0 and < V2.5). An attacker can cause a denial-of-service condition on the network stack by sending a large number of specially crafted packets to the PLC. The PLC will lose its ability to communicate over the network. This vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no privileges and no user interaction. An attacker could use this vulnerability to compromise availability of the network connectivity. At the time of advisory publication no public exploitation of this vulnerability was known.
|
[
"cpe:2.3:o:siemens:simatic_et_200sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200sp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500f:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-56fc-v6xr-69v4
|
School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at unitmarks.php.
|
[] | null | 9.8 | null | null | null |
|
CVE-2020-14517
|
Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.
|
[
"cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-xgrc-wxf2-c646
|
recorder_test.cgi on the D-Link DCS-2121 camera with firmware 1.04 allows remote attackers to execute arbitrary commands via shell metacharacters in the Password field, related to a "semicolon injection" vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2023-21521
|
An SQL Injection vulnerability in the Management Console (Operator Audit Trail) of BlackBerry AtHoc version 7.15 could allow an attacker to potentially read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database, recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system.
|
[
"cpe:2.3:a:blackberry:athoc:7.15:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-3993-mq32-jgqq
|
Cross-site scripting (XSS) vulnerability in the User Karma module 5.x before 5.x-1.13 and 6.x before 6.x-1.0-beta1, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified messages.
|
[] | null | null | null | null | null |
|
RHSA-2020:5235
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null | null |
GHSA-mpqp-5vhg-m67q
|
The LoginPress | Custom Login Page Customizer WordPress plugin before 1.5.12 does not escape the redirect-page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting
|
[] | null | 6.1 | null | null | null |
|
CVE-2022-36293
|
Buffer overflow vulnerability in Nintendo Wi-Fi Network Adaptor WAP-001 All versions allows an attacker with an administrative privilege to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:o:nintendo:wi-fi_network_adaptor_wap_001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nintendo:wi-fi_network_adaptor_wap_001:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2015-3675
|
The default configuration of the Apache HTTP Server on Apple OS X before 10.10.4 does not enable the mod_hfs_apple module, which allows remote attackers to bypass HTTP authentication via a crafted URL.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-fv7m-mhm7-76v2
|
Alpine Linux version Versions prior to 2.6.10, 2.7.6, and 2.10.1 contains a Other/Unknown vulnerability in apk-tools (Alpine Linux' package manager) that can result in Remote Code Execution. This attack appear to be exploitable via A specially crafted APK-file can cause apk to write arbitrary data to an attacker-specified file, due to bugs in handling long link target name and the way a regular file is extracted.. This vulnerability appears to have been fixed in 2.6.10, 2.7.6, and 2.10.1.
|
[] | null | null | 8.8 | null | null |
|
CVE-2023-40385
|
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 17 and iPadOS 17. A remote attacker may be able to view leaked DNS queries with Private Relay turned on.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2010-4538
|
Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
|
[
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-vv39-3w5q-974q
|
Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API
|
A security vulnerability has been discovered in Kubernetes windows nodes that could allow a user with the ability to query a node's '/logs' endpoint to execute arbitrary commands on the host. This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below.
|
[] | null | 5.9 | null | null | null |
CVE-2023-47503
|
An issue in jflyfox jfinalCMS v.5.1.0 allows a remote attacker to execute arbitrary code via a crafted script to the login.jsp component in the template management module.
|
[
"cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-32jj-82v4-hh23
|
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
|
[] | null | null | null | null | null |
|
GHSA-39mf-48wx-6xcc
|
The eHRMS from 104 Corporation has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.
|
[] | null | 6.1 | null | null | null |
|
CVE-1999-1404
|
IBM/Tivoli OPC Tracker Agent version 2 release 1 allows remote attackers to cause a denial of service (resource exhaustion) via malformed data to the localtracker client port (5011), which prevents the connection from being closed properly.
|
[
"cpe:2.3:a:ibm:tivoli_opc_tracker_agent:1.0x:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_opc_tracker_agent:2.0x:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_opc_tracker_agent:3.0x:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-2844
|
The PDF functionality in Google Chrome before 20.0.1132.57 does not properly handle JavaScript code, which allows remote attackers to cause a denial of service (incorrect object access) or possibly have unspecified other impact via a crafted document.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.55:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2023-35124
|
An information disclosure vulnerability exists in the OAS Engine configuration management functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to a disclosure of sensitive information. An attacker can send a sequence of requests to trigger this vulnerability.
|
[
"cpe:2.3:a:openautomationsoftware:oas_platform:18.00.0072:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
|
GHSA-653w-f3pr-6cv6
|
In JetBrains TeamCity before 2022.10.2 jVMTI was enabled by default on agents.
|
[] | null | 9.8 | null | null | null |
|
CVE-2015-5580
|
Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
|
[
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.191:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.203:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.209:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.232:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2014-0353
|
The ZyXEL Wireless N300 NetUSB NBG-419N router with firmware 1.00(BFQ.6)C0 allows remote attackers to bypass authentication by using %2F sequences in place of / (slash) characters.
|
[
"cpe:2.3:o:zyxel:n300_netusb_nbg-419n_firmware:1.00\\(bfq_6\\)c0:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:n300_netusb_nbg-419n:-:*:*:*:*:*:*:*"
] | null | null | null | 6.1 | null |
|
CVE-2024-5095
|
Victor Zsviot Camera MQTT Packet denial of service
|
A vulnerability classified as problematic has been found in Victor Zsviot Camera 8.26.31. This affects an unknown part of the component MQTT Packet Handler. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 7.1 | 6.5 | 6.5 | 6.3 | null |
CVE-2017-16514
|
Multiple persistent stored Cross-Site-Scripting (XSS) vulnerabilities in the files /wb/admin/admintools/tool.php (Droplet Description) and /install/index.php (Site Title) in WebsiteBaker 2.10.0 allow attackers to insert persistent JavaScript code that gets reflected back to users in multiple areas in the application.
|
[
"cpe:2.3:a:websitebaker:websitebaker:2.10.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-gmm6-vqjm-5p45
|
It was found that CloudForms does not verify that the server hostname matches the domain name in the certificate when using a custom CA and communicating with Red Hat Virtualization (RHEV) and OpenShift. This would allow an attacker to spoof RHEV or OpenShift systems and potentially harvest sensitive information from CloudForms.
|
[] | null | null | 7.5 | null | null |
|
GHSA-m9rq-q2hr-f64w
|
Stack-based buffer overflow in Advantech WebAccess, formerly BroadWin WebAccess, before 8.0 allows remote attackers to execute arbitrary code via a crafted ip_address parameter in an HTML document.
|
[] | null | null | null | null | null |
|
CVE-2023-46192
|
WordPress Internal Link Building Plugin <= 1.2.3 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Internet Marketing Ninjas Internal Link Building plugin <= 1.2.3 versions.
|
[
"cpe:2.3:a:internetmarketingninjas:internal_link_building:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
RHSA-2024:11027
|
Red Hat Security Advisory: ruby:2.5 security update
|
rexml: REXML ReDoS vulnerability
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null | null |
CVE-2025-31352
|
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateGateways' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25915)
|
[] | 8.7 | 8.8 | null | null | null |
|
CVE-2024-52425
|
WordPress Drozd – Addons for Elementor plugin <= 1.1.1 - Stored Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Urchenko Drozd – Addons for Elementor allows Stored XSS.This issue affects Drozd – Addons for Elementor: from n/a through 1.1.1.
|
[
"cpe:2.3:a:urchenko:drozd:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-cr23-gw9g-5cwj
|
Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the offset provided for the stack value duplication instruction, DUP. The offset is unchecked and memory prior to the start of the execution stack can be read and treated as a TVM object. A successful exploit could use the vulnerability to leak runtime information such as the heap handle or pointer for a number of TVM context variables. Some reachable values may be controlled enough to forge a TVM object on the stack, leading to possible remote code execution.
|
[] | null | null | null | null | null |
|
GHSA-4rw8-6238-r9gq
|
In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_tables: don't skip expired elements during walkThere is an asymmetry between commit/abort and preparation phase if the
following conditions are met:set is a verdict map ("1.2.3.4 : jump foo")timeouts are enabledIn this case, following sequence is problematic:element E in set S refers to chain Cuserspace requests removal of set Skernel does a set walk to decrement chain->use count for all elements
from preparation phasekernel does another set walk to remove elements from the commit phase
(or another walk to do a chain->use increment for all elements from
abort phase)If E has already expired in 1), it will be ignored during list walk, so its use count
won't have been changed.Then, when set is culled, ->destroy callback will zap the element via
nf_tables_set_elem_destroy(), but this function is only safe for
elements that have been deactivated earlier from the preparation phase:
lack of earlier deactivate removes the element but leaks the chain use
count, which results in a WARN splat when the chain gets removed later,
plus a leak of the nft_chain structure.Update pipapo_get() not to skip expired elements, otherwise flush
command reports bogus ENOENT errors.
|
[] | null | null | null | null | null |
|
CVE-2005-3452
|
Unspecified vulnerability in Web Cache in Oracle Application Server 1.0 up to 9.0.4.2 has unknown impact and attack vectors, as identified by Oracle Vuln# AS13.
|
[
"cpe:2.3:a:oracle:application_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2023-25648
|
Weak Folder Permission Vulnerability in ZTE ZXCLOUD iRAI
|
There is a weak folder permission vulnerability in ZTE's ZXCLOUD iRAI product. Due to weak folder permission, an attacker with ordinary user privileges could construct a fake DLL to execute command to escalate local privileges.
|
[
"cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2017-5122
|
Inappropriate use of table size handling in V8 in Google Chrome prior to 61.0.3163.100 for Windows allowed a remote attacker to trigger out-of-bounds access via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-9vjh-4gwm-v5xm
|
SQL Injection exists in the Google Map Landkarten through 4.2.3 component for Joomla! via the cid or id parameter in a layout=form_markers action, or the map parameter in a layout=default action.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-47993
|
A Buffer out-of-bound read vulnerability in Exif.cpp::ReadInt32 in FreeImage 3.18.0 allows attackers to cause a denial-of-service.
|
[
"cpe:2.3:a:freeimage_project:freeimage:3.18.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-2374-xjj3-xj59
|
In SolarWinds SFTP/SCP Server through 2018-09-10, the configuration file is world readable and writable, and stores user passwords in an insecure manner, allowing an attacker to determine passwords for potentially privileged accounts. This also grants the attacker an ability to backdoor the server.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-21861
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Visual Analyzer). Supported versions that are affected are 5.9.0.0.0 and 6.4.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:6.4.0.0.0:*:*:*:enterprise:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-gh7h-r3ff-2vq6
|
Insecure storage of sensitive information in Wing FTP Server (User Web Client) allows information elicitation.This issue affects Wing FTP Server: <= 7.2.0.
|
[] | null | 7.5 | null | null | null |
|
GHSA-p2pp-ch98-m4g2
|
Unspecified vulnerability in the WebLogic Server component in Oracle BEA Product Suite 9.2, 9.1, 9.0, and 8.1 SP6 has unknown impact and local attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-jrcw-75j2-gf53
|
The Brain lab - brain age games IQ (aka com.sixdead.brainlab) application 2.37 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.