id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-3475
|
Sticky Buttons < 3.2.4 - Button Deletion via CSRF
|
The Sticky Buttons WordPress plugin before 3.2.4 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting buttons via CSRF attacks
|
[] | null | 7.5 | null | null | null |
CVE-2024-32148
|
WordPress Pardot plugin <= 2.1.0 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Salesforce Pardot.This issue affects Pardot: from n/a through 2.1.0.
|
[] | null | 4.3 | null | null | null |
GHSA-wvpx-9v99-j88h
|
Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[] | null | null | null | null | null |
|
GHSA-pwwp-53vp-7mv3
|
A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been classified as critical. Affected is the function laporan_filter of the file /application/controller/Transaki.php. The manipulation of the argument dari/sampai leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259746 is the identifier assigned to this vulnerability.
|
[] | null | 6.3 | null | null | null |
|
GHSA-3pcr-4982-548m
|
Exposure of .env if project root is configured as web root in shopware/production
|
ImpactThe .env and other sensitive files can be leaked if the project root and not `/public` is configured as the web root.PatchesWe recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.https://www.shopware.com/en/download/#shopware-6WorkaroundsYou should always use `/public` as the web root.For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659For more informationhttps://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021
|
[] | null | null | null | null | null |
GHSA-w2h2-6mfq-pg77
|
A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
|
[] | null | null | 9.8 | null | null |
|
GHSA-whgj-f82x-p3xc
|
Opera, possibly 9.64 and earlier, allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.
|
[] | null | null | null | null | null |
|
RHSA-2006:0164
|
Red Hat Security Advisory: mod_auth_pgsql security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-hwqw-qqjm-38q9
|
IBM Planning Analytics Local 2.0 and 2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 289889.
|
[] | null | 5.4 | null | null | null |
|
GHSA-mj59-82hp-pgf4
|
A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell.
|
[] | null | 7.2 | null | null | null |
|
CVE-2004-0291
|
SQL injection vulnerability in post.php for YaBB SE 1.5.4 and 1.5.5 allows remote attackers to obtain hashed passwords via the quote parameter.
|
[
"cpe:2.3:a:yabb:yabb:1.5.4:*:second_edition:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:1.5.5:*:second_edition:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2021-41504
|
An Elevated Privileges issue exists in D-Link DCS-5000L v1.05 and DCS-932L v2.17 and older. The use of the digest-authentication for the devices command interface may allow further attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
|
[
"cpe:2.3:o:dlink:dcs-932l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-5000l_firmware:1.05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-5000l:-:*:*:*:*:*:*:*"
] | null | 8 | null | 5.2 | null |
|
GHSA-cppx-x244-mfpp
|
Absolute path traversal vulnerability in a certain ActiveX control in vielib.dll 2.2.5.42958 in EMC VMware 6.0.0 allows remote attackers to execute arbitrary local programs via a full pathname in the first argument to the StartProcess method.
|
[] | null | null | null | null | null |
|
GHSA-58vx-vc62-43fr
|
The RSS for Yandex Turbo WordPress plugin before 1.30 did not properly sanitise the user inputs from its Счетчики settings tab before outputting them back in the page, leading to authenticated stored Cross-Site Scripting issues
|
[] | null | null | null | null | null |
|
GHSA-xcrg-8639-cf22
|
Missing Authorization vulnerability in heoLixfy Flexible Woocommerce Checkout Field Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Flexible Woocommerce Checkout Field Editor: from n/a through 2.0.1.
|
[] | null | 8.2 | null | null | null |
|
RHSA-2022:5460
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.24 security update
|
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | 8.8 | null | null | null |
GHSA-mw5g-f42h-mghp
|
sourcebans-pp (SourceBans++) 1.5.4.7 has XSS in admin.comms.php via the rebanid parameter.
|
[] | null | null | 6.1 | null | null |
|
CVE-2024-37371
|
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
|
[
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
|
GHSA-66qg-x433-hvxq
|
The ninja-forms plugin before 3.3.9 for WordPress has insufficient restrictions on submission-data retrieval during Export Personal Data requests.
|
[] | null | null | 9.1 | null | null |
|
RHSA-2007:0817
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
javaws vulnerabilities Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null | null |
CVE-2006-0007
|
Buffer overflow in GIFIMP32.FLT, as used in Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, and other products, allows user-assisted attackers to execute arbitrary code via a crafted GIF image that triggers memory corruption when it is parsed.
|
[
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-wwqq-4gf5-wp78
|
An information disclosure vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in memory, aka 'Windows Imaging Component Information Disclosure Vulnerability'.
|
[] | null | null | null | null | null |
|
CVE-2022-4030
|
The Simple:Press plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 6.8 via the 'file' parameter which can be manipulated during user avatar deletion. This makes it possible with attackers, with minimal permissions such as a subscriber, to supply paths to arbitrary files on the server that will subsequently be deleted. This can be used to delete the wp-config.php file that can allow an attacker to configure the site and achieve remote code execution.
|
[
"cpe:2.3:a:simple-press:simple\\:press:*:*:*:*:*:wordpress:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-8x79-8v3m-4q7w
|
Noah's Classifieds 1.3 allows remote attackers to obtain the installation path via a direct request to include files, as demonstrated by classifieds/gorum/category.php.
|
[] | null | null | null | null | null |
|
GHSA-hhcq-vjf5-gv22
|
The Orders Tracking for WooCommerce WordPress plugin before 1.1.10 does not sanitise and escape the file_url before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting
|
[] | null | null | null | null | null |
|
GHSA-84vw-rqhm-9cj2
|
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP APM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, a reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of F5 BIG-IP Guided Configuration that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
|
[] | null | 6.1 | null | null | null |
|
CVE-2020-29013
|
An improper input validation vulnerability in the sniffer interface of FortiSandbox before 3.2.2 may allow an authenticated attacker to silently halt the sniffer via specifically crafted requests.
|
[
"cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:3.2.1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
RHSA-2024:7074
|
Red Hat Security Advisory: Network Observability 1.6.2 for OpenShift
|
net/http: Denial of service due to improper 100-continue handling in net/http
|
[
"cpe:/a:redhat:network_observ_optr:1.6.0::el9"
] | null | 5.9 | null | null | null |
CVE-2004-1650
|
D-Link DCS-900 Internet Camera listens on UDP port 62976 for an IP address, which allows remote attackers to change the IP address of the camera via a UDP broadcast packet.
|
[
"cpe:2.3:h:d-link:dcs-900_internet_camera:2.10:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:dcs-900_internet_camera:2.20:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:dcs-900_internet_camera:2.28:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-9q4x-xv6h-72vf
|
Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28457, CVE-2021-28473, CVE-2021-28475, CVE-2021-28477.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-11112
|
Use after free in Media in Google Chrome on Windows prior to 131.0.6778.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2020-2773
|
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
[
"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"
] | null | null | 3.7 | null | null |
|
CVE-2024-49339
|
IBM Financial Transaction Manager cross-site scripting
|
IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4.0 through 3.2.4.1 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[
"cpe:2.3:a:ibm:financial_transaction_manager_for_multiplatform:3.2.4.0:*:*:*:swift_services:*:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager_for_multiplatform:3.2.4.13:*:*:*:swift_services:*:*:*"
] | null | 6.4 | null | null | null |
CVE-2024-3319
|
Security implication in SailPoint Identity Security Cloud IdentityProfile API Endpoints
|
An issue was identified in the Identity Security Cloud (ISC) Transform preview and IdentityProfile preview API endpoints that allowed an authenticated administrator to execute user-defined templates as part of attribute transforms which could allow remote code execution on the host.
|
[
"cpe:2.3:a:sailpoint:identity_security_cloud:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
CVE-2005-3221
|
Multiple interpretation error in unspecified versions of Fortinet Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
|
[
"cpe:2.3:h:fortinet:fortinet_antivirus:*:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
GHSA-5phm-xfxq-9mgw
|
Autodesk Customer Support Portal allows cases created by users under an account to see cases created by other users on the same account.
|
[] | null | 4.3 | null | null | null |
|
GHSA-qv8f-pvcv-2mmv
|
An information leak in Tokudaya.ekimae_mc v13.6.1 allows attackers to obtain the channel access token and send crafted messages.
|
[] | null | 7.5 | null | null | null |
|
GHSA-rvf6-cp8q-hrxp
|
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.
|
[] | null | null | 7.5 | null | null |
|
GHSA-3m7j-m5w9-6wr7
|
An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console.
|
[] | null | null | null | null | null |
|
CVE-2010-3297
|
The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-j233-pm3q-vxq5
|
Microsoft Exchange Server Spoofing Vulnerability
|
[] | null | 8 | null | null | null |
|
GHSA-x9rv-vww8-vmj9
|
neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
|
[] | null | null | null | null | null |
|
GHSA-9x83-932v-7gvm
|
IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security under certain conditions. This could result in a downgrade of TLS protocol. A remote attacker could exploit this vulnerability to perform man-in-the-middle attacks. IBM X-Force ID: 147292.
|
[] | null | null | 5.9 | null | null |
|
CVE-2020-8478
|
ABB System 800xA Inter process communication vulnerability
|
Insufficient protection of the inter-process communication functions in ABB System 800xA products OPC Server for AC 800M, MMS Server for AC 800M and Base Software for SoftControl (all published versions) enables an attacker authenticated on the local system to inject data, affecting the online view of runtime data shown in Control Builder.
|
[
"cpe:2.3:a:abb:mms_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:opc_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:ac800m:-:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:base_software:*:*:*:*:*:softcontrol:*:*"
] | null | 5.3 | null | null | null |
CVE-2024-26168
|
Secure Boot Security Feature Bypass Vulnerability
|
Secure Boot Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
RHSA-2023:0276
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (python-scciclient) security update
|
python-scciclient: missing server certificate verification
|
[
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 7.4 | null | null | null |
GHSA-hrmf-cjwr-cmvh
|
In ImageMagick 7.0.5-5, a memory leak was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service via a crafted file.
|
[] | null | null | 6.5 | null | null |
|
RHSA-2008:0100
|
Red Hat Security Advisory: java-1.4.2-bea security update
|
Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition java: Vulnerability in the font parsing code Security Vulnerability in Java Runtime Environment With Applet Caching Untrusted Application or Applet May Move or Copy Arbitrary Files Applets or Applications are allowed to display an oversized window Anti-DNS Pinning and Java Applets with HTTP proxy
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null | null |
GHSA-43h6-fcm4-w3mq
|
A access of uninitialized pointer in Fortinet FortiOS version 7.2.0, 7.0.0 through 7.0.5, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x, FortiProxy version 7.0.0 through 7.0.4, 2.0.0 through 2.0.9, 1.2.x allows a remote unauthenticated or authenticated attacker to crash the sslvpn daemon via an HTTP GET request.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-42911
|
A Format String vulnerability exists in DrayTek Vigor 2960 <= 1.5.1.3, DrayTek Vigor 3900 <= 1.5.1.3, and DrayTek Vigor 300B <= 1.5.1.3 in the mainfunction.cgi file via a crafted HTTP message containing malformed QUERY STRING, which could let a remote malicious user execute arbitrary code.
|
[
"cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*",
"cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-62wf-24c4-8r76
|
Cross-site Scripting vulnerability in Jenkins
|
Since Jenkins 2.320 and LTS 2.332.1, help icon tooltips no longer escape the feature name, effectively undoing the fix for [SECURITY-1955](https://www.jenkins.io/security/advisory/2020-08-12/#SECURITY-1955).This vulnerability is known to be exploitable by attackers with Job/Configure permission.Jenkins 2.356, LTS 2.332.4 and LTS 2.346.1 addresses this vulnerability, the feature name in help icon tooltips is now escaped.
|
[] | null | 8 | null | null | null |
RHSA-2018:3618
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Information Disclosure vulnerability (APSB18-39)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null | null |
CVE-2013-1386
|
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384.
|
[
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
PYSEC-2019-246
| null |
In Exiv2 0.27.99.0, there is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in mrwimage.cpp. It could result in denial of service.
|
[] | null | 6.5 | null | null | null |
GHSA-px37-jpqx-97q9
|
AWS SAM CLI Path Traversal allows file copy to build container
|
SummaryThe [AWS Serverless Application Model Command Line Interface (AWS SAM CLI)](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/using-sam-cli.html) is an open-source CLI tool that helps Lambda developers to build and develop Lambda applications locally on their computers using Docker.When running the AWS SAM CLI build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container.Users should [upgrade to v1.133.0](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/manage-sam-cli-versions.html#manage-sam-cli-versions-upgrade) or newer and ensure any forked or derivative code is patched to incorporate the new fixes.ImpactThis issue is limited to the local workspace and does not affect AWS services, production environments or cross-account resources. The issue only affects local workspaces using AWS SAM CLI with container builds (--use-container), potentially allowing access to local files outside the build directory through the usage of symlinks.**Impacted versions:** <= AWS SAM CLI v1.132.0PatchesThe issue has been addressed in version 1.133.0. Users should upgrade and ensure any forked or derivative code is patched to incorporate the new fixes. To retain the previous behavior and allow symlinks to resolve on the host machine, please use the explicit '-[-mount-symlinks](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/sam-cli-command-reference-sam-build.html#ref-sam-cli-build-options-mount-symlinks)' parameter.WorkaroundsThere is no recommended work around. Customers are advised to upgrade to version v1.133.0 or the latest version.ReferencesCVE-2025-3047If you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting) or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.CreditWe would like to thank [Kevin Backhouse](https://github.com/kevinbackhouse) with the GitHub Security Lab for collaborating on this issue through the coordinated vulnerability disclosure process.
|
[] | 6.9 | 6.5 | null | null | null |
GHSA-7f8g-xqpj-293g
|
Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-43242.
|
[] | null | 5.7 | null | null | null |
|
GHSA-3h9q-2vfr-m8cp
|
BluePage CMS thru 3.9 processes an insufficiently sanitized HTTP Header Cookie value allowing MySQL Injection in the 'users-cookie-settings' token using a Time-based blind SLEEP payload.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-35815
|
DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data.
|
[] | null | 3.5 | null | null | null |
|
GHSA-qjg8-52hj-5hj8
|
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in tvOS 16.2, iCloud for Windows 14.1, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing a maliciously crafted file may lead to arbitrary code execution.
|
[] | null | 7.8 | null | null | null |
|
GHSA-3x2j-h977-v75r
|
cJSON before 1.7.11 allows out-of-bounds access, related to multiline comments.
|
[] | null | 9.8 | null | null | null |
|
GHSA-2454-558w-967q
|
PHP remote file inclusion vulnerability in includes/profilcp_constants.php in the Profile Control Panel (CPanel) module for mxBB 0.91c allows remote attackers to execute arbitrary PHP code via a URL in the module_root_path parameter.
|
[] | null | null | null | null | null |
|
CVE-2011-1091
|
libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.
|
[
"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2007-0809
|
PHP remote file inclusion vulnerability in includes/class_template.php in Categories hierarchy (aka CH or mod-CH) 2.1.2 in ptirhiikmods allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
|
[
"cpe:2.3:a:ptirhiikmods:mod-ch:2.1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2023:0556
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
|
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: directory listing / code exfiltration CXF: SSRF Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 9.8 | 5.6 | null | null |
CVE-2017-10824
|
Untrusted search path vulnerability in TDB CA TypeA use software Version 5.2 and earlier, distributed until 10 August 2017 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[
"cpe:2.3:a:teikoku_databank:type_a:5.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-pp7p-q5v7-3cr2
|
The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS command injection, allowing an attacker to execute arbitrary commands via a crafted FCStd document.
|
[] | null | 7.8 | null | null | null |
|
GHSA-r33g-3864-p55f
|
In HalCoreCallback of halcore.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure from the NFC firmware with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-229994861
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-5786
|
Cross-Site Request Forgery vulnerability in Comtrend router
|
Cross-Site Request Forgery vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability allows an attacker to force an end user to execute unwanted actions in a web application to which he is authenticated.
|
[] | null | 6.5 | null | null | null |
CVE-1999-0279
|
Excite for Web Servers (EWS) allows remote command execution via shell metacharacters.
|
[
"cpe:2.3:a:excite:ews:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-g352-7rff-pgcm
|
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.13.3 via the su_meta shortcode due to missing validation on the user controlled keys 'key' and 'post_id'. This makes it possible for authenticated attackers, with contributor-level access and above, to retrieve arbitrary post meta values which may contain sensitive information when combined with another plugin.
|
[] | null | 4.3 | null | null | null |
|
CVE-2024-26660
|
drm/amd/display: Implement bounds check for stream encoder creation in DCN301
|
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Implement bounds check for stream encoder creation in DCN301
'stream_enc_regs' array is an array of dcn10_stream_enc_registers
structures. The array is initialized with four elements, corresponding
to the four calls to stream_enc_regs() in the array initializer. This
means that valid indices for this array are 0, 1, 2, and 3.
The error message 'stream_enc_regs' 4 <= 5 below, is indicating that
there is an attempt to access this array with an index of 5, which is
out of bounds. This could lead to undefined behavior
Here, eng_id is used as an index to access the stream_enc_regs array. If
eng_id is 5, this would result in an out-of-bounds access on the
stream_enc_regs array.
Thus fixing Buffer overflow error in dcn301_stream_encoder_create
reported by Smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 <= 5
|
[] | null | 5.5 | null | null | null |
GHSA-6fw5-p8j4-2pg7
|
The XtendCU Mobile (aka com.metova.cuae.xtend) application 1.0.28 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-8242-q5jq-p64w
|
An admin user can gain unauthorized write access to the /etc/rc.local file on the device, which is executed on a system boot.
|
[] | 6.1 | 6.8 | null | null | null |
|
CVE-2023-43863
|
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanDhcpplus function.
|
[
"cpe:2.3:h:d-link:dir-619l:b1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-619l_firmware:2.02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2021-3794
|
Inefficient Regular Expression Complexity in vuelidate/vuelidate
|
vuelidate is vulnerable to Inefficient Regular Expression Complexity
|
[
"cpe:2.3:a:vuelidate_project:vuelidate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha1:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha10:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha11:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha12:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha13:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha14:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha15:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha16:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha17:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha18:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha19:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha2:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha20:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha21:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha22:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha23:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha24:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha25:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha3:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha4:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha5:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha6:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha7:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha8:*:*:*:node.js:*:*",
"cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha9:*:*:*:node.js:*:*"
] | null | null | 7.5 | null | null |
GHSA-fr8m-vw66-8v9r
|
tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.
|
[] | null | null | null | null | null |
|
CVE-2021-38202
|
fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-6gj6-5cm3-g43x
|
Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
|
[] | null | 7 | null | null | null |
|
CVE-2023-22709
|
WordPress SRS Simple Hits Counter Plugin <= 1.1.0 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Atif N SRS Simple Hits Counter plugin <= 1.1.0 versions.
|
[
"cpe:2.3:a:srs_simple_hits_counter_project:srs_simple_hits_counter:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2023-29141
|
An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-v48v-g43p-fph8
|
konzept-ix publiXone before 2020.015 allows attackers to download files by iterating over the IXCopy fileID parameter.
|
[] | null | null | null | null | null |
|
CVE-2005-2532
|
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.
|
[
"cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta7:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta8:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta9:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta10:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta12:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta13:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta15:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta16:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta17:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta18:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta19:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta20:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_beta28:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-p3vc-9w4j-j66m
|
Missing Authorization vulnerability in MobileMonkey WP-Chatbot for Messenger allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP-Chatbot for Messenger: from n/a through 4.7.
|
[] | null | 5.4 | null | null | null |
|
GHSA-9cxv-8fwp-3hgq
|
Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters.
|
[] | null | null | null | null | null |
|
ICSA-23-199-04
|
Weintek Weincloud
|
The affected product could allow an attacker to reset a password with the corresponding account's JWT token only. The affected product could allow an attacker to abuse the registration functionality to login with testing credentials to the official website. The affected product could allow an attacker to efficiently develop a brute force attack on credentials with authentication hints from error message responses. The affected product could allow an attacker to cause a denial-of-service condition for Weincloud by sending a forged JWT token.
|
[] | null | null | 7.5 | null | null |
GHSA-jm6m-rr5p-wgp8
|
Atos Unify OpenScape Session Border Controller through V10 R3.01.03 allows execution of administrative scripts by unauthenticated users.
|
[] | null | 9.8 | null | null | null |
|
CVE-2009-3742
|
Cross-site scripting (XSS) vulnerability in Liferay Portal before 5.3.0 allows remote attackers to inject arbitrary web script or HTML via the p_p_id parameter.
|
[
"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2020:5246
|
Red Hat Security Advisory: rh-mariadb103-mariadb and rh-mariadb103-galera security update
|
mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.9 | 3.7 | null | null |
GHSA-2x4j-5xgh-5xq5
|
SQL injection vulnerability in newsletter.php in Sourceworkshop newsletter 1.0 allows remote attackers to execute arbitrary SQL commands via the newsletteremail parameter.
|
[] | null | null | null | null | null |
|
GHSA-gwqc-9564-p87g
|
In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441589; Issue ID: ALPS07441589.
|
[] | null | 6.7 | null | null | null |
|
cisco-sa-XE-ACE-75K3bRWe
|
Cisco IOS XE Software Arbitrary Code Execution Vulnerability
|
A vulnerability in the boot logic of Cisco IOS XE Software could allow an authenticated, local attacker with level 15 privileges or an unauthenticated attacker with physical access to execute arbitrary code on the underlying Linux operating system of an affected device.
This vulnerability is due to incorrect validations of specific function arguments that are passed to the boot script. An attacker could exploit this vulnerability by tampering with a specific file, which an affected device would process during the initial boot process. On systems that are protected by the Unified Extensible Firmware Interface (UEFI) secure boot feature, a successful exploit could allow the attacker to execute unsigned code at boot time and bypass the image verification check in the secure boot process of the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408"].
|
[] | null | 6.8 | null | null | null |
CVE-2022-0974
|
Use after free in Splitscreen in Google Chrome on Chrome OS prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2017-1000015
|
phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a CSS injection attack through crafted cookie parameters
|
[
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.17:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.18:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.5:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2017-16586
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addAnnot method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5295.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:8.3.2.25013:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-fh25-9x6m-wx4x
|
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues.Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32605.
|
[] | null | 5.4 | null | null | null |
|
GHSA-fh59-cj56-8q9p
|
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.
|
[] | null | null | null | null | null |
|
GHSA-8w7m-78c5-5pmm
|
Heap-based buffer overflow in the JPEG2000 image tile decoder in OpenJPEG before 1.5.2 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file because of incorrect j2k_decode, j2k_read_eoc, and tcd_decode_tile interaction, a related issue to CVE-2013-6045. NOTE: this is not a duplicate of CVE-2013-1447, because the scope of CVE-2013-1447 was specifically defined in http://openwall.com/lists/oss-security/2013/12/04/6 as only "null pointer dereferences, division by zero, and anything that would just fit as DoS."
|
[] | null | null | 8.8 | null | null |
|
GHSA-cp4j-fgwr-jvwf
|
A heap based buffer overflow vulnerability exists in ffjpeg through 2020-07-02 in the jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c (line 544 & line 545), which could cause a denial of service by submitting a malicious jpeg image.
|
[] | null | 5.5 | null | null | null |
|
GHSA-cf44-q5xm-mxm4
|
IdeaLMS 2022 allows SQL injection via the IdeaLMS/ChatRoom/ClassAccessControl/6?isBigBlueButton=0&ClassID= pathname.
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-6629
|
A vulnerability in the ImageID parameter of Cisco Unity Connection 10.5(2) could allow an unauthenticated, remote attacker to access files in arbitrary locations on the filesystem of an affected device. The issue is due to improper sanitization of user-supplied input in HTTP POST parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. Cisco Bug IDs: CSCvd90118.
|
[
"cpe:2.3:a:cisco:unity_connection:10.5\\(2\\):*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.