id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2013-4952
|
SQL injection vulnerability in functions/global.php in Elemata CMS RC 3.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:elemata:elemata_cms:3.0:rc:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-33481
|
RemoteClinic 2.0 is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of patients/index.php.
|
[
"cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2020-14765
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-xrwr-fgmg-h9xp
|
Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to bypass authentication.
|
[] | null | 7.3 | null | null | null |
|
GHSA-63cg-v2rp-wpv5
|
Integer overflow in FastStone Image Viewer 2.9 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a crafted BMP image, as demonstrated by wh3intof.bmp and wh4intof.bmp.
|
[] | null | null | null | null | null |
|
CVE-2023-47843
|
WordPress CataBlog Plugin <= 1.7.0 is vulnerable to Arbitrary File Deletion
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Zachary Segal CataBlog.This issue affects CataBlog: from n/a through 1.7.0.
|
[] | null | 7.6 | null | null | null |
CVE-2021-1703
|
Windows Event Logging Service Elevation of Privilege Vulnerability
|
Windows Event Logging Service Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-3vp4-6x9x-47fg
|
An improper input validation vulnerability in LDFW prior to SMR Dec-2021 Release 1 allows attackers to perform arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2025-5994
|
Cache poisoning via the ECS-enabled Rebirthday Attack
|
A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.
|
[] | 8.7 | null | null | null | null |
GHSA-735f-v862-xcr3
|
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's web authentication flow to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. The private repository metadata returned would be limited to repositories owned by the user the token identifies. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in versions 3.0.4, 2.22.10, 2.21.18. This vulnerability was reported via the GitHub Bug Bounty program.
|
[] | null | 6.5 | null | null | null |
|
CVE-2018-9028
|
Weak cryptography used for passwords in CA Privileged Access Manager 2.x reduces the complexity for password cracking.
|
[
"cpe:2.3:a:broadcom:privileged_access_manager:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2022-44202
|
D-Link DIR878 1.02B04 and 1.02B05 are vulnerable to Buffer Overflow.
|
[
"cpe:2.3:o:dlink:dir-878_firmware:1.02b04:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-878_firmware:1.02b05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-878:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-544f-g2r6-4rv9
|
A vulnerability in Synology Active Backup for Microsoft 365 allows remote authenticated attackers to obtain sensitive information via unspecified vectors.
|
[] | null | 6.5 | null | null | null |
|
GHSA-vcjj-xf2r-mwvc
|
XSS in knockout
|
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
|
[] | null | 6.1 | null | null | null |
GHSA-wx35-29xj-r29q
|
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to modify protected parts of the file system.
|
[] | null | 5.5 | null | null | null |
|
CVE-2017-6745
|
A vulnerability in the cache server within Cisco Videoscape Distribution Suite (VDS) for Television 3.2(5)ES1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted appliance. The vulnerability is due to excessive mapped connections exhausting the allotted resources within the system. An attacker could exploit this vulnerability by sending large amounts of inbound traffic to a device with the intention of overloading certain resources. A successful exploit could cause the device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc39260.
|
[
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.2\\(5\\)es1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.2\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.2\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.5\\(1\\)-cos:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.8\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.9\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.4\\(1\\):*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
RHSA-2024:1394
|
Red Hat Security Advisory: ovn23.03 security update
|
ovn: insufficient validation of BFD packets may lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 6.5 | null | null | null |
GHSA-jqwc-jm56-wcwj
|
Cross-site scripting in Jupyter Notebook
|
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.
|
[] | 6.9 | 5.3 | null | null | null |
CVE-2022-30466
|
joyebike Joy ebike Wolf Manufacturing year 2022 is vulnerable to Authentication Bypass by Capture-replay.
|
[
"cpe:2.3:o:joybike:wolf_firmware:2022:*:*:*:*:*:*:*",
"cpe:2.3:h:joybike:wolf:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 | null |
|
CVE-2020-11668
|
In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | 5.6 | null |
|
CVE-2021-31584
|
Sipwise C5 NGCP www_csc version 3.6.4 up to and including platform NGCP CE mr3.8.13 allows call/click2dial CSRF attacks for actions with administrative privileges.
|
[
"cpe:2.3:a:sipwise:next_generation_communication_platform:3.6.4:*:*:*:ce:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-vq83-9rx8-rq3m
|
A stored Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Recovery Manager Plus before 5.3 (Build 5350) allows remote authenticated users (with Add New Technician permissions) to inject arbitrary web script or HTML via the loginName field to technicianAction.do.
|
[] | null | null | 5.4 | null | null |
|
GHSA-5jj4-fh62-42vp
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.0 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. GitLab allows unauthenticated users to download user avatars using the victim's user ID, on private instances that restrict public level visibility.
|
[] | null | 5.3 | null | null | null |
|
CVE-2018-4860
|
A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could execute arbitrary operating system commands. Successful exploitation requires that the attacker has network access to the web interface. The attacker must be authenticated as administrative user to exploit the security vulnerability. The vulnerability could allow an attacker to execute arbitrary code on the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
|
[
"cpe:2.3:o:siemens:scalance_m875_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_m875:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 | null |
|
GHSA-gppg-373r-fpj5
|
Use after free in Blink in Google Chrome prior to 93.0.4577.63 allowed an attacker who convinced a user to drag and drop a malicous folder to a page to potentially perform a sandbox escape via a crafted HTML page.
|
[] | null | null | null | null | null |
|
CVE-2010-3563
|
Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to "how Web Start retrieves security policies," BasicServiceImpl, and forged policies that bypass sandbox restrictions.
|
[
"cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-3r3f-mm7w-fqhr
|
An issue was discovered in VirusTotal. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
|
[] | null | null | 7.8 | null | null |
|
CVE-2018-13193
|
The mintToken function of a smart contract implementation for hentaisolo (HAO), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:hentaisolo_project:hentaisolo:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-p2v9-r2xq-vp8c
|
The Scoptrial package in PyPI version v0.0.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-41970
|
WAGO: Unauthorized Diagnostic Data Exposure in Multiple Devices
|
A low privileged remote attacker may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources.
|
[] | null | 5.7 | null | null | null |
GHSA-v6jv-x2rf-449c
|
An information disclosure vulnerability exists in the Vault API functionality of ClearML Enterprise Server 3.22.5-1533. A specially crafted HTTP request can lead to reading vaults that have been previously disabled, possibly leaking sensitive credentials. An attacker can send a series of HTTP requests to trigger this vulnerability.
|
[] | null | 7.7 | null | null | null |
|
GHSA-9p5f-qg2p-2m8h
|
Multiple unspecified vulnerabilities in Oracle Collaboration Suite Release 2, version 9.0.4.2 (Oracle9i) have unspecified impact and attack vectors, as identified by Oracle Vuln# (1) OCS01, 2) OCS02, 3) OCS03, 4) OCS04, 5) OCS05, 6) OCS06, 7) OCS07, (8) OCS08, and (9) OCS09 in the (a) Email Server component; 10) OCS10 (and (11) OCS11 in the (b) Oracle Collaboration Suite Wireless & Voice (component; 12) OCS12 and (13) OCS13 in the (c) Oracle Content (Management SDK component; 14) OCS14 and (15) OCS15 in the (d) Oracle (Content Services component.
|
[] | null | null | null | null | null |
|
GHSA-fq29-72jg-5hrj
|
The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through.
|
[] | null | 5.9 | null | null | null |
|
CVE-2024-12907
|
XSS in Kentico 7
|
Kentico CMS in version 7 is vulnerable to a Reflected XSS attacks through manipulation of a specific GET request parameter sent to /CMSMessages/AccessDenied.aspx endpoint.
Notably, support for this version of Kentico ended in 2016. Version 8 was tested as well and does not contain this vulnerability.
|
[] | 5.3 | null | null | null | null |
ICSA-22-167-07
|
Siemens SINEMA Remote Connect Server
|
Affected application is missing general HTTP security headers in the web server configured on port 443. This could aid attackers by making the servers more prone to clickjacking, channel downgrade attacks and other similar client-based attack vectors. Affected application is missing general HTTP security headers in the web server configured on port 6220. This could aid attackers by making the servers more prone to clickjacking, channel downgrade attacks and other similar client-based attack vectors.
|
[] | null | 4.2 | null | null | null |
ICSA-18-107-05
|
ICSA-18-107-05_Rockwell Automation Stratix Industrial Managed Ethernet Switch
|
A format string vulnerability in the LLDP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an adjacent, unauthenticated attacker to cause a DoS condition or execute arbitrary code with elevated privileges.CVE-2018-0167 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 8.8 | null | null |
CVE-2015-5209
|
Apache Struts 2.x before 2.3.24.1 allows remote attackers to manipulate Struts internals, alter user sessions, or affect container settings via vectors involving a top object.
|
[
"cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2016-6973
|
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2024-54237
|
WordPress Ni CRM Lead plugin <= 1.3.0 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in anzia Ni CRM Lead allows Reflected XSS.This issue affects Ni CRM Lead: from n/a through 1.3.0.
|
[] | null | 7.1 | null | null | null |
CVE-2019-17533
|
Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.
|
[
"cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 8.2 | null | 6.4 | null |
|
GHSA-mc8v-g9x4-8r2m
|
In ims, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319095; Issue ID: ALPS07319095.
|
[] | null | 7.8 | null | null | null |
|
CVE-2021-23933
|
OX App Suite through 7.10.4 allows XSS via JavaScript in a Note referenced by a mail:// URL.
|
[
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-g9w7-8hcr-36c9
|
A Win32k information disclosure vulnerability exists in Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, Windows 10, and Windows Server 2016 when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system, aka "Win32k Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-0189.
|
[] | null | null | 3.3 | null | null |
|
GHSA-47p5-p3jw-w78w
|
Server-Side Request Forgery in Plone CMS
|
An issue in Plone CMS allows attacker to access sensitive information via the RSS feed protlet.
|
[] | 8.7 | 8.8 | null | null | null |
CVE-2019-14784
|
The "CP Contact Form with PayPal" plugin before 1.2.98 for WordPress has XSS in CSS edition.
|
[
"cpe:2.3:a:codepeople:cp_contact_form_with_paypal:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-7448-crw6-qvfr
|
Cross Site Scripting (XSS) vulnerability in sourcecodester Lost and Found Information System 1.0 allows remote attackers to run arbitrary code via the First Name, Middle Name and Last Name fields on the Create User page.
|
[] | null | 6.1 | null | null | null |
|
ICSA-22-195-08
|
Siemens PADS Standard/Plus Viewer
|
The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-037, FG-VD-22-059) The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-038) The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-039) The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-040) The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-041) The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-042) The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-043) The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-044) The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-045) The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-046) The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-047) The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-048) The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-049) The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-050) The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-051) The affected application contains a stack corruption vulnerability while parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-052, FG-VD-22-056) The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-053) The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-054) The affected application contains a stack corruption vulnerability while parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-055) The affected application contains a stack corruption vulnerability while parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-057, FG-VD-22-058, FG-VD-22-060)
|
[] | null | 3.3 | null | null | null |
CVE-2021-44023
|
A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.
|
[
"cpe:2.3:a:trendmicro:antivirus\\+_security_2021:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:internet_security_2021:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:maximum_security_2021:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:premium_security_2021:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | 3.6 | null |
|
CVE-2025-6545
|
pbkdf2 silently returns predictable uninitialized/zero-filled memory for non-normalized or unimplemented algos supported by Node.js
|
Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js.
This issue affects pbkdf2: from 3.0.10 through 3.1.2.
|
[] | 9.1 | null | null | null |
https://github.com/browserify/pbkdf2/commit/e3102a8cd4830a3ac85cd0dd011cc002fdde33bb
|
GHSA-wr4m-qx5p-qh76
|
In A2DP_GetCodecType of a2dp_codec_config, there is a possible out-of-bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android, Versions: Android-10, Android ID: A-79703353.
|
[] | null | null | null | null | null |
|
RHSA-2022:8545
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | 6.1 | null | null |
GHSA-66rc-wh84-rj79
|
mediaserver in Android before 5.1.1 LMY48Z allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 17769851, a different vulnerability than CVE-2015-6616, CVE-2015-8506, and CVE-2015-8507.
|
[] | null | null | null | null | null |
|
CVE-2023-49688
|
Job Portal v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
|
Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'txtUser' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[
"cpe:2.3:a:kashipara:job_portal:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2022-24981
|
A reflected cross-site scripting (XSS) vulnerability in forms generated by JQueryForm.com before 2022-02-05 allows remote attackers to inject arbitrary web script or HTML via the redirect parameter to admin.php.
|
[
"cpe:2.3:a:jqueryform:jqueryform:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-qcv4-42jw-9gpj
|
Runtime Toolkit before 2.4.7.48 in 3S-Smart CODESYS before 2.3.9.48 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted request.
|
[] | null | null | null | null | null |
|
GHSA-h6ch-r6c4-wc9h
|
Untrusted search path vulnerability in Adobe InDesign CS4 6.0, InDesign CS5 7.0.2 and earlier, Adobe InDesign Server CS5 7.0.2 and earlier, and Adobe InCopy CS5 7.0.2 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as an .indl, .indp, .indt, or .inx file.
|
[] | null | null | null | null | null |
|
GHSA-vq7j-qwwp-ggc5
|
Multiple cross-site scripting (XSS) vulnerabilities in Php-Nuke 6.x through 7.3 allow remote attackers to inject arbitrary HTML or web script into the (1) optionbox parameter in the News module, (2) date parameter in the Statistics module, (3) year, month, and month_1 parameters in the Stories_Archive module, (4) mode, order, and thold parameters in the Surveys module, or (5) a SQL statement to index.php, as processed by mainfile.php.
|
[] | null | null | null | null | null |
|
GHSA-q96j-9qv9-3vw2
|
The PhonerLite phone before 2.15 provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
|
[] | null | null | null | null | null |
|
GHSA-32rg-hvr8-56hx
|
fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.
|
[] | null | null | null | null | null |
|
CVE-2021-46599
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15393.
|
[
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
|
CVE-2024-13323
|
Booking Calendar <= 10.9.2 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via 'booking' Shortcode
|
The WP Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'booking' shortcode in all versions up to, and including, 10.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-pgr8-2267-r79x
|
Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
|
[] | null | null | 9.8 | null | null |
|
cisco-sa-ucce-tip-dos-7cdLUASb
|
Cisco Unified Contact Center Enterprise Denial of Service Vulnerability
|
A vulnerability in the Live Data server of Cisco Unified Contact Center Enterprise could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability exists because the affected software improperly manages resources when processing inbound Live Data traffic. An attacker could exploit this vulnerability by sending multiple crafted Live Data packets to an affected device. A successful exploit could cause the affected device to run out of buffer resources, which could result in a stack overflow and cause the affected device to reload, resulting in a DoS condition.
Note: The Live Data port in Cisco Unified Contact Center Enterprise devices allows only a single TCP connection. To exploit this vulnerability, an attacker would have to send crafted packets to an affected device before a legitimate Live Data client establishes a connection.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucce-tip-dos-7cdLUASb ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucce-tip-dos-7cdLUASb"]
|
[] | null | null | 6.8 | null | null |
GHSA-v6mw-73m7-7f5j
|
Unspecified vulnerability in Oracle Database 9.2.0.8, 10.1.0.5, and 10.2.0.3 has unknown impact and attack vectors related to the Change Data Capture and sys.dbms_cdc_subscribe privileges, aka DB02.
|
[] | null | null | null | null | null |
|
CVE-2024-2998
|
Bdtask Multi-Store Inventory Management System Store Update Page cross site scripting
|
A vulnerability was found in Bdtask Multi-Store Inventory Management System up to 20240320. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Store Update Page. The manipulation of the argument Store Name/Store Address leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258200. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 2.4 | 2.4 | 3.3 | null |
GHSA-p246-2wqm-73pp
|
Windows Telephony Service Remote Code Execution Vulnerability
|
[] | null | 8.8 | null | null | null |
|
GHSA-v734-hjcr-pm54
|
The IncomingMailServers resource in Atlassian Jira before version 7.6.2 allows remote attackers to modify the "incoming mail" whitelist setting via a Cross-site request forgery (CSRF) vulnerability.
|
[] | null | null | 4.3 | null | null |
|
CVE-2025-4257
|
SeaCMS admin_pay.php cross site scripting
|
A vulnerability, which was classified as problematic, has been found in SeaCMS 13.2. This issue affects some unknown processing of the file /admin_pay.php. The manipulation of the argument cstatus leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 3.5 | 3.5 | 4 | null |
CVE-2013-7417
|
Cross-site scripting (XSS) vulnerability in cgi-bin/ipinfo.cgi in IPCop (aka IPCop Firewall) before 2.1.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING. NOTE: this can be used to bypass the cross-site request forgery (CSRF) protection mechanism by setting the Referer.
|
[
"cpe:2.3:o:ipcop:ipcop:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-4860
|
KBase Metrics methods_upload_user_stats.py upload_user_data sql injection
|
A vulnerability was found in KBase Metrics. It has been classified as critical. This affects the function upload_user_data of the file source/daily_cron_jobs/methods_upload_user_stats.py. The manipulation leads to sql injection. The patch is named 959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217059.
|
[
"cpe:2.3:a:kbase:metrics:*:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 |
https://github.com/kbase/metrics/commit/959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d
|
GHSA-8mjr-6c96-39w8
|
pydash Command Injection vulnerability
|
This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects.**Note:**The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied:The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible)The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method)The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function.
|
[] | 9.1 | 7.4 | null | null | null |
CVE-2023-33651
|
An issue in the MVC Device Simulator of Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) v9.0 Initial Release to v13.0 Initial Release allows attackers to bypass authorization rules.
|
[
"cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2015-0603
|
Cisco Unified IP 9900 phones with firmware 9.4(.1) and earlier use weak permissions for unspecified files, which allows local users to cause a denial of service (persistent hang or reboot) by writing to a phone's filesystem, aka Bug ID CSCup90474.
|
[
"cpe:2.3:o:cisco:unified_ip_phones_9900_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_9951:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_9971:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2003-1209
|
The Post_Method function in Monkey HTTP Daemon before 0.6.2 allows remote attackers to cause a denial of service (crash) via a POST request without a Content-Type header.
|
[
"cpe:2.3:a:monkey-project:monkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.6.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-5322
|
D-Link DAR-7000 edit_manageadmin.php sql injection
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sysmanage/edit_manageadmin.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240992. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
|
[
"cpe:2.3:o:dlink:dar-7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dar-7000:-:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 | null |
GHSA-m662-x5x5-33fp
|
NVIDIA ChatRTX for Windows contains a vulnerability in ChatRTX UI, where a user can cause an improper privilege management issue by exploiting interprocess communication between different processes. A successful exploit of this vulnerability might lead to information disclosure, escalation of privileges, and data tampering.
|
[] | null | 7.5 | null | null | null |
|
CVE-2022-47324
|
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 6.4 | null | null | null |
|
CVE-2022-30045
|
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap out-of-bounds read.
|
[
"cpe:2.3:a:ezxml_project:ezxml:0.8.6:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-4fm6-v3v9-jp3f
|
Deserialization of Untrusted Data vulnerability in PlexTrac (Runbooks modules) which allows Object Injection and arbitrary file writes.This issue affects PlexTrac: from 1.61.3 before 2.8.1.
|
[] | 8.6 | null | null | null | null |
|
GHSA-6h6f-5f86-82pp
|
Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Cross Site Scripting (XSS) via lform/urlfilter.
|
[] | null | 5.4 | null | null | null |
|
GHSA-f48w-q85w-r7rw
|
An injection issue was addressed with improved validation. This issue is fixed in Shazam Android App Version 9.25.0, Shazam iOS App Version 12.11.0. Processing a maliciously crafted URL may lead to arbitrary javascript code execution.
|
[] | null | null | null | null | null |
|
GHSA-fvgx-w879-p88q
|
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Elastic Search). Supported versions that are affected are 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
|
[] | null | 4.3 | null | null | null |
|
GHSA-mpr8-9q5c-jhw7
|
An issue was discovered on D-Link 6600-AP and DWL-3600AP Ax 4.2.0.14 21/03/2019 devices. There is a pre-authenticated denial of service attack against the access point via a long action parameter to admin.cgi.
|
[] | null | null | null | null | null |
|
CVE-2020-8432
|
In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.
|
[
"cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2018-5730
|
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
|
[
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 3.8 | null | 5.5 | null |
|
GHSA-xgjj-696c-x9g9
|
StoreBackup before 1.19 does not properly set the uid and guid for symbolic links (1) that are backed up by storeBackup.pl, or (2) recovered by storeBackupRecover.pl, which could cause files to be restored with incorrect ownership.
|
[] | null | null | null | null | null |
|
RHSA-2022:4899
|
Red Hat Security Advisory: compat-openssl11 security and bug fix update
|
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null | null |
CVE-2008-0895
|
BEA WebLogic Server and WebLogic Express 6.1 through 10.0 allows remote attackers to bypass authentication for application servlets via crafted request headers.
|
[
"cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp6:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-4qvv-mxxh-c39w
|
Improper export of Android application components in Bluetooth prior to SMR Jun-2025 Release 1 allows local attackers to make devices discoverable.
|
[] | null | 4 | null | null | null |
|
GHSA-p87m-68pc-hg94
|
A vulnerability was found in Weaver E-Office 9.5. It has been classified as critical. This affects an unknown part of the file /inc/jquery/uploadify/uploadify.php. The manipulation of the argument Filedata leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228777 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | null | 6.3 | null | null |
|
CVE-2014-9761
|
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
|
[
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-9474-6fxf-wjj8
|
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 could allow an authenticated user to perform unauthorized actions that should be reserved to administrator used due to improper access controls.
|
[] | null | 4.3 | null | null | null |
|
CVE-2007-6339
|
The Akamai Download Manager (aka DLM or dlmanager) ActiveX control (DownloadManagerV2.ocx) before 2.2.3.5 allows remote attackers to force the download and execution of arbitrary code via unspecified "undocumented object parameters."
|
[
"cpe:2.3:a:akamai_technologies:download_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-jj42-23mj-m8hv
|
Multiple cross-site scripting (XSS) vulnerabilities in Joomla! before 1.0.13 (aka Sunglow) allow remote attackers to inject arbitrary web script or HTML via the (1) Title or (2) Section Name form fields in the Section Manager component, or (3) multiple unspecified fields in New Menu Item.
|
[] | null | null | null | null | null |
|
RHSA-2024:10178
|
Red Hat Security Advisory: Red Hat build of Keycloak 26.0.6 Update
|
org.keycloak/keycloak-quarkus-server: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability keycloak-core: mTLS passthrough org.keycloak:keycloak-services: Keycloak Denial of Service org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process keycloak-quarkus-server: Keycloak path trasversal
|
[
"cpe:/a:redhat:build_keycloak:26"
] | null | 5.9 | 2.7 | null | null |
GHSA-fq6r-qhq8-2958
|
The encryption implementation in Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 makes it easier for remote attackers to discover the plaintext content of VPN sessions by sniffing the network for ciphertext data and conducting an unspecified decryption attack.
|
[] | null | null | null | null | null |
|
RHSA-2011:1506
|
Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 3-Month End Of Life Notice
|
This is the 3-month notification of the End Of Life plans for Red Hat
Enterprise Linux 4.
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-c4rw-hvmq-4hrh
|
SQL injection vulnerability in mods.php in GNUTurk 2G and earlier allows remote attackers to execute arbitrary SQL commands via the t_id parameter when the go parameter is "Forum."
|
[] | null | null | null | null | null |
|
cisco-sa-20190306-nxos-privesca
|
Cisco NX-OS Software Privilege Escalation Vulnerability
|
A vulnerability in the user account management interface of Cisco NX-OS Software could allow an authenticated, local attacker to gain elevated privileges on an affected device.
The vulnerability is due to an incorrect authorization check of user accounts and their associated Group ID (GID). An attacker could exploit this vulnerability by taking advantage of a logic error that will permit the use of higher privileged commands than what is necessarily assigned. A successful exploit could allow an attacker to execute commands with elevated privileges on the underlying Linux shell of an affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca"]
This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-70757"].
|
[] | null | null | 7.3 | null | null |
CVE-2017-9244
|
Cross-site scripting (XSS) vulnerability in the Trello app before 4.0.8 for iOS might allow remote attackers to inject arbitrary web script or HTML by uploading and attaching a crafted photo to a Card.
|
[
"cpe:2.3:a:trello:trello:*:*:*:*:*:iphone_os:*:*"
] | null | null | 6.1 | 4.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.