id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2019-18465
In Progress MOVEit Transfer 11.1 before 11.1.3, a vulnerability has been found that could allow an attacker to sign in without full credentials via the SSH (SFTP) interface. The vulnerability affects only certain SSH (SFTP) configurations, and is applicable only if the MySQL database is being used.
[ "cpe:2.3:a:ipswitch:moveit_transfer:*:*:*:*:*:*:*:*" ]
null
9.8
null
6.8
null
CVE-2022-49849
btrfs: fix match incorrectly in dev_args_match_device
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix match incorrectly in dev_args_match_device syzkaller found a failed assertion: assertion failed: (args->devid != (u64)-1) || args->missing, in fs/btrfs/volumes.c:6921 This can be triggered when we set devid to (u64)-1 by ioctl. In this case, the match of devid will be skipped and the match of device may succeed incorrectly. Patch 562d7b1512f7 introduced this function which is used to match device. This function contains two matching scenarios, we can distinguish them by checking the value of args->missing rather than check whether args->devid and args->uuid is default value.
[]
null
null
null
null
null
RHSA-2021:3768
Red Hat Security Advisory: kpatch-patch security update
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
null
CVE-2020-15958
An issue was discovered in 1CRM System through 8.6.7. An insecure direct object reference to internally stored files allows a remote attacker to access various sensitive information via an unauthenticated request with a predictable URL.
[ "cpe:2.3:a:1crm:1crm:*:*:*:*:*:*:*:*" ]
null
8.6
null
5
null
GHSA-7w34-8gpx-5fr8
DCME-320 <=7.4.12.90, DCME-520 <=9.25.5.11, DCME-320-L, <=9.3.5.26, and DCME-720 <=9.1.5.11 are vulnerable to Remote Code Execution via /function/system/basic/license_update.php.
[]
null
9.8
null
null
null
GHSA-c4qg-xp59-6j7v
StructuredQuery in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how objects are handled in memory, aka "StructuredQuery Remote Code Execution Vulnerability".
[]
null
null
7.5
null
null
CVE-2009-0128
plugins/crypto/openssl/crypto_openssl.c in Simple Linux Utility for Resource Management (aka SLURM or slurm-llnl) does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
[ "cpe:2.3:a:llnl:slurm:_nil_:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-h3g3-622v-m4xx
Windows Graphics Component Information Disclosure Vulnerability
[]
null
5.5
null
null
null
CVE-2021-24825
Custom Content Shortcode < 4.0.2 - Authenticated Arbitrary File Access / LFI
The Custom Content Shortcode WordPress plugin before 4.0.2 does not validate the data passed to its load shortcode, which could allow Contributor+ (v < 4.0.1) or Admin+ (v < 4.0.2) users to display arbitrary files from the filesystem (such as logs, .htaccess etc), as well as perform Local File Inclusion attacks as PHP files will be executed. Please note that such attack is still possible by admin+ in single site blogs by default (but won't be when either the unfiltered_html or file_edit is disallowed)
[ "cpe:2.3:a:custom_content_shortcode_project:custom_content_shortcode:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
4
null
CVE-2023-21003
In getAvailabilityStatus of several Transcode Permission Controllers, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261193711
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2020-25926
The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.
[ "cpe:2.3:a:hcc-embedded:nichestack_tcp\\/ip:4.0.1:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2022-49950
misc: fastrpc: fix memory corruption on open
In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: fix memory corruption on open The probe session-duplication overflow check incremented the session count also when there were no more available sessions so that memory beyond the fixed-size slab-allocated session array could be corrupted in fastrpc_session_alloc() on open().
[]
null
null
null
null
null
CVE-2022-34100
A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a low-privileged user can gain a SYSTEM level command prompt by pre-staging a file structure prior to the installation of a trusted service executable and change permissions on that file structure during a repair operation.
[ "cpe:2.3:a:crestron:airmedia:4.3.1.39:*:*:*:*:windows:*:*" ]
null
8.8
null
null
null
CVE-2025-27523
XXE vulnerability in JP1/IT Desktop Management 2 - Smart Device Manager
XXE vulnerability in Hitachi JP1/IT Desktop Management 2 - Smart Device Manager on Windows.This issue affects JP1/IT Desktop Management 2 - Smart Device Manager: from 12-00 before 12-00-08, from 11-10 through 11-10-08, from 11-00 through 11-00-05, from 10-50 through 10-50-06.
[]
null
8.7
null
null
null
GHSA-8ggv-3jq6-v4qr
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0988, CVE-2018-0996.
[]
null
null
7.5
null
null
GHSA-vgrj-mg42-7vqg
A cross-site scripting (XSS) vulnerability in the component mcgs/admin/aboutus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle parameter.
[]
null
4.6
null
null
null
GHSA-v573-78hv-qjj4
CafeLog b2 Weblog Tool 2.06pre4, with allow_fopen_url enabled, allows remote attackers to execute arbitrary PHP code via the b2inc variable.
[]
null
null
null
null
null
CVE-2021-43546
It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
null
CVE-1999-1531
Buffer overflow in IBM HomePagePrint 1.0.7 for Windows98J allows a malicious Web site to execute arbitrary code on a viewer's system via a long IMG_SRC HTML tag.
[ "cpe:2.3:a:ibm:homepageprint:1.0.7:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2015-2915
Securifi Almond devices with firmware before AL1-R201EXP10-L304-W34 and Almond-2015 devices with firmware before AL2-R088M have a default password of admin for the admin account, which allows remote attackers to obtain web-management access by leveraging the ability to authenticate from the intranet.
[ "cpe:2.3:o:securifi:almond_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:securifi:almond:*:*:*:*:*:*:*:*", "cpe:2.3:o:securifi:almond-2015_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:securifi:almond-2015:*:*:*:*:*:*:*:*" ]
null
null
null
7.3
null
CVE-2005-1498
Multiple cross-site scripting (XSS) vulnerabilities in myBloggie 2.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) year parameter in viewmode.php, or the (2) cat_id, (3) month_no, or (4) post_id parameter in index.php, which are not properly sanitized before they are displayed in an error message. NOTE: issues 2, 3, and 4 may be due to a problem in associated products rather than myBloggie itself.
[ "cpe:2.3:a:mywebland:mybloggie:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mywebland:mybloggie:2.1.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-73wg-cvjc-54gr
The updraftplus plugin before 1.13.5 for WordPress has XSS in rare cases where an attacker controls a string logged to a log file.
[]
null
null
6.1
null
null
CVE-2024-27110
Elevation of privilege vulnerability in GE HealthCare EchoPAC products
Elevation of privilege vulnerability in GE HealthCare EchoPAC products
[ "cpe:2.3:h:gehealthcare:image_vault:-:*:*:*:*:*:*:*", "cpe:2.3:a:gehealthcare:echopac_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:gehealthcare:echopac_turnkey:-:*:*:*:*:*:*:*" ]
null
8.4
null
null
null
CVE-2008-3916
Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.
[ "cpe:2.3:a:gnu:ed:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:ed:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:ed:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:ed:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:ed:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:ed:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:ed:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:ed:0.9:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-xq66-7995-4f8c
Unspecified vulnerability in SAP Web Application Server 6.40 before patch 136 and 7.00 before patch 66 allows remote attackers to cause a denial of service (enserver.exe crash) via a 0x72F2 sequence on UDP port 64999.
[]
null
null
null
null
null
CVE-2023-1039
SourceCodester Class and Exam Timetabling System POST Parameter index3.php sql injection
A vulnerability classified as critical was found in SourceCodester Class and Exam Timetabling System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index3.php of the component POST Parameter Handler. The manipulation of the argument password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221797 was assigned to this vulnerability.
[ "cpe:2.3:a:class_and_exam_timetabling_system_project:class_and_exam_timetabling_system:1.0:*:*:*:*:*:*:*" ]
null
7.3
7.3
7.5
null
CVE-2015-0618
Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with extension headers, aka Bug ID CSCuq95241.
[ "cpe:2.3:o:cisco:ios_xr:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:network_convergence_system_6000:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:carrier_routing_system:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:carrier_routing_system:5.1.4:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
CVE-2019-2171
In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113035086
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
CVE-2014-9351
engine/server/server.cpp in Teeworlds 0.6.x before 0.6.3 allows remote attackers to read memory and cause a denial of service (crash) via unspecified vectors.
[ "cpe:2.3:a:teeworlds:teeworlds:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:teeworlds:teeworlds:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:teeworlds:teeworlds:6.2:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
CVE-2024-28820
Buffer overflow in the extract_openvpn_cr function in openvpn-cr.c in openvpn-auth-ldap (aka the Three Rings Auth-LDAP plugin for OpenVPN) 2.0.4 allows attackers with a valid LDAP username and who can control the challenge/response password field to pass a string with more than 14 colons into this field and cause a buffer overflow.
[ "cpe:2.3:a:threerings:openvpn-auth-ldap:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
CVE-2016-0753
Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
[ "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
CVE-2024-32354
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain a command injection vulnerability via the 'timeout' parameter in the setSSServer function at /cgi-bin/cstecgi.cgi.
[ "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*" ]
null
6
null
null
null
CVE-2020-0893
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-0894.
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2013-6623
The SVG implementation in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging the use of tree order, rather than transitive dependency order, for layout.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-7cf8-v985-h6fc
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound OK Poster Group allows Reflected XSS. This issue affects OK Poster Group: from n/a through 1.1.
[]
null
7.1
null
null
null
GHSA-9963-gmh8-vvm6
Session fixation vulnerability in Jenkins Keycloak Authentication Plugin
Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login.
[]
null
9.8
null
null
null
GHSA-rhp4-4ff3-m4c6
Memory leak in the gf_isom_oinf_read_entry function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
[]
null
5.5
null
null
null
PYSEC-2021-60
null
Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as "tenable-jira-cloud". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().
[]
null
null
null
null
null
CVE-2009-0971
Cross-site scripting (XSS) vulnerability in futomi's CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
[ "cpe:2.3:a:futomi:access_analyzer_cgi:*:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:std:*:*:*:*:*", "cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:std:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-52096
SteVe Community ocpp-jaxb before 0.0.8 generates invalid timestamps such as ones with month 00 in certain situations (such as when an application receives a StartTransaction Open Charge Point Protocol message with a timestamp parameter of 1000000). This may lead to a SQL exception in applications, and may undermine the integrity of transaction records.
[ "cpe:2.3:a:steve-community:ocpp-jaxb:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2024-7498
itsourcecode Airline Reservation System Admin Login Page login.php login2 sql injection
A vulnerability was found in itsourcecode Airline Reservation System 1.0. It has been classified as critical. Affected is the function login/login2 of the file /admin/login.php of the component Admin Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273624.
[ "cpe:2.3:a:itsourcecode:airline_reservation_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:angeljudesuarez:airline_reservation_system:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
null
GHSA-8hxv-rpqg-55px
Unspecified vulnerability in Adobe ColdFusion 9.0 before Update 10, 9.0.1 before Update 9, 9.0.2 before Update 4, and 10 before Update 9 allows attackers to obtain administrator-console access via unknown vectors.
[]
null
null
null
null
null
CVE-2021-27782
HCL BigFix Mobile / Modern Client Management Server passwords are susceptible to a brute-force attack
HCL BigFix Mobile / Modern Client Management Admin and Config UI passwords can be brute-forced. User should be locked out for multiple invalid attempts.
[ "cpe:2.3:a:hcltech:bigfix_mobile:2.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2023-21593
Adobe InDesign SVG file NULL Pointer Dereference Application denial-of-service
Adobe InDesign versions ID18.1 (and earlier) and ID17.4 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:indesign:18.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:indesign:18.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2020-11065
Cross-Site Scripting in TYPO3 CMS
In TYPO3 CMS greater than or equal to 9.5.12 and less than 9.5.17, and greater than or equal to 10.2.0 and less than 10.4.2, it has been discovered that link tags generated by typolink functionality are vulnerable to cross-site scripting; properties being assigned as HTML attributes have not been parsed correctly. This has been fixed in 9.5.17 and 10.4.2.
[ "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-phf8-xfvh-mfwq
A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition.
[]
null
null
null
null
null
RHSA-2019:3436
Red Hat Security Advisory: httpd:2.4 security and bug fix update
httpd: mod_auth_digest: access control bypass due to race condition httpd: URL normalization inconsistency
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
3.3
null
null
CVE-2017-16120
liyujing is a static file server. liyujing is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
[ "cpe:2.3:a:liyujing_project:liyujing:1.0.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:liyujing_project:liyujing:1.1.0:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
null
GHSA-79ww-5cvq-f84f
In parse_gap_data of utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
[]
null
5.5
null
null
null
CVE-2013-3409
The portal in Cisco Prime Central for Hosted Collaboration Solution (HCS) places cleartext credentials in temporary files, which allows local users to obtain sensitive information by leveraging weak file permissions to read these files, aka Bug IDs CSCuh33735 and CSCuh34230.
[ "cpe:2.3:a:cisco:prime_central_for_hosted_collaboration_solution:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-7qj6-vx86-3xm5
Session fixation vulnerability in Zen Cart 1.3.7 and earlier allows remote attackers to hijack web sessions by setting the Cookie parameter.
[]
null
null
null
null
null
RHSA-2024:1941
Red Hat Security Advisory: thunderbird security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
null
CVE-2016-5319
Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file.
[ "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-5pvx-gc3m-qw38
The (1) torcs, (2) nfsperf, (3) accc, (4) texmapper, (5) trackgen, and (6) nfs2ac scripts in TORCS 1.3.1 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
[]
null
null
null
null
null
CVE-2010-0226
SanDisk Cruzer Enterprise USB flash drives do not prevent password replay attacks, which allows physically proximate attackers to access the cleartext drive contents by providing a key that was captured in a USB data stream at an earlier time.
[ "cpe:2.3:h:sandisk:cruzer_enterprise_usb:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2018-14355
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", "cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" ]
null
5.3
null
5
null
GHSA-x6hf-28q4-37gq
When ldns version 1.7.1 verifies a zone file, the ldns_rr_new_frm_str_internal function has a heap out of bounds read vulnerability. An attacker can leak information on the heap by constructing a zone file payload.
[]
null
null
null
null
null
GHSA-6fgh-25rx-v99w
Cross-site scripting (XSS) vulnerability in Lutim before 0.8 might allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is mishandled in an upload notification and in the myfiles component, if the attacker can convince the victim to proceed with an upload despite the appearance of an XSS payload in the filename.
[]
null
null
6.1
null
null
GHSA-2mmg-r5qc-hhcj
archive_read_support_format_tar.c in libarchive before 2.2.4 allows user-assisted remote attackers to cause a denial of service (infinite loop) via (1) an end-of-file condition within a pax extension header or (2) a malformed pax extension header in an (a) PAX or a (b) TAR archive.
[]
null
null
null
null
null
CVE-2016-3271
The VBScript engine in Microsoft Edge allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Scripting Engine Information Disclosure Vulnerability."
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-67g9-m5c8-562g
IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute arbitrary commands due to improper process controls.
[]
null
9.6
null
null
null
CVE-2022-0431
Google Pagespeed Insights < 4.0.4 - Reflected Cross-Site Scripting
The Insights from Google PageSpeed WordPress plugin before 4.0.4 does not sanitise and escape various parameters before outputting them back in attributes in the plugin's settings dashboard, leading to Reflected Cross-Site Scripting
[ "cpe:2.3:a:insights_from_google_pagespeed_project:insights_from_google_pagespeed:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
null
GHSA-qhxq-wjg2-hvvj
Cross-site request forgery (CSRF) vulnerability on ASUS GT-AC5300 routers with firmware through 3.0.0.4.384_32738 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via a request to start_apply.htm.
[]
null
null
8.8
null
null
CVE-2019-2295
Information disclosure due to lack of address range check done on the SysDBG buffers in SDI code. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, MDM9205, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, Nicobar, QCS404, QCS405, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, Snapdragon_High_Med_2016, SXR1130
[ "cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
GHSA-mc5r-4c5q-83w5
XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .rle file, related to a "Data Execution Prevention Violation starting at Unknown Symbol @ 0x000000000c1b541c called from xnview+0x00000000003826ec."
[]
null
null
7.8
null
null
CVE-2024-0699
The AI Engine: Chatbots, Generators, Assistants, GPT 4 and more! plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'add_image_from_url' function in all versions up to, and including, 2.1.4. This makes it possible for authenticated attackers, with Editor access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
[ "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*" ]
null
6.6
null
null
null
CVE-2001-0781
Buffer overflow in SpoonFTP 1.0.0.12 allows remote attackers to execute arbitrary code via a long argument to the commands (1) CWD or (2) LIST.
[ "cpe:2.3:a:pi-soft:spoonftp:1.0.0.12:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-3rm8-425f-x7q5
Inappropriate implementation in PictureInPicture in Google Chrome prior to 113.0.5672.63 allowed a remote attacker who had compromised the renderer process to obfuscate the security UI via a crafted HTML page. (Chromium security severity: Low)
[]
null
4.3
null
null
null
RHSA-2022:6157
Red Hat Security Advisory: curl security update
curl: HTTP compression denial of service curl: Unpreserved file permissions curl: FTP-KRB bad message verification
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
null
CVE-2025-34067
Hikvision Integrated Security Management Platform Remote Command Execution via applyCT Fastjson
An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system.
[]
10
null
null
null
null
GHSA-2jww-vv25-vx2m
Unspecified vulnerability in the Oracle Retail MICROS C2 component in Oracle Retail Applications 9.89.0.0 allows local users to affect confidentiality via vectors related to POS.
[]
null
null
5.5
null
null
GHSA-m39x-pwc9-4whq
SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an unauthenticated attacker to exploit missing XML validations at endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can enable the attacker to retrieve arbitrary files from the server.
[]
null
null
null
null
null
GHSA-x3cq-8f32-5f63
Apache RocketMQ may have remote code execution vulnerability when using update configuration function
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
[]
null
9.8
null
null
null
CVE-2021-24850
Insert Pages < 3.7.0 - Contributor+ Stored Cross-Site Scripting
The Insert Pages WordPress plugin before 3.7.0 adds a shortcode that prints out other pages' content and custom fields. It can be used by users with a role as low as Contributor to perform Cross-Site Scripting attacks by storing the payload/s in another post's custom fields.
[ "cpe:2.3:a:insert_pages_project:insert_pages:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
3.5
null
GHSA-rhqq-6hxm-qhgr
SQL injection vulnerability in index.php in ScriptMagix Recipes 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter.
[]
null
null
null
null
null
CVE-2020-1372
An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles objects in memory, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1405.
[ "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
CVE-1999-0053
TCP RST denial of service in FreeBSD.
[ "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2015-1252
common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a write operation with a large amount of data, related to the PartialCircularBuffer::Write and PartialCircularBuffer::DoWrite functions.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2001-0020
Directory traversal vulnerability in Arrowpoint (aka Cisco Content Services, or CSS) allows local unprivileged users to read arbitrary files via a .. (dot dot) attack.
[ "cpe:2.3:h:cisco:arrowpoint:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:content_services_switch:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2009-0693
Multiple buffer overflows in Wyse Device Manager (WDM) 4.7.x allow remote attackers to execute arbitrary code via (1) the User-Agent HTTP header to hserver.dll or (2) unspecified input to hagent.exe.
[ "cpe:2.3:a:dell:wyse_device_manager:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:dell:wyse_device_manager:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:dell:wyse_device_manager:4.7.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2021-33602
Denial-of-Service (DoS) Vulnerability
A vulnerability affecting the F-Secure Antivirus engine was discovered when the engine tries to unpack a zip archive (LZW decompression method), and this can crash the scanning engine. The vulnerability can be exploited remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine.
[ "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:cloud_protection:*:*:*:*:*:salesforce:*:*", "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-3h2h-j4vg-8xm8
An issue in Notion for macOS version 3.1.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.
[]
null
9.8
null
null
null
CVE-2024-8934
Beckhoff: Local command injection via TwinCAT Package Manager
A local user with administrative access rights can enter specialy crafted values for settings at the user interface (UI) of the TwinCAT Package Manager which then causes arbitrary OS commands to be executed.
[ "cpe:2.3:a:beckhoff:twincat_packet_manager:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-f44q-634c-jvwv
libp2p DoS vulnerability from lack of resource management
ImpactVersions older than `v0.38.0` of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.Patches (What to do as a js-libp2p consumer:)Update your js-libp2p dependency to `v0.38.0` or greater.WorkaroundsThere are no workarounds, and so we recommend to upgrade your js-libp2p version. Some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using iptables or ufw ) or making use of a load balancer in front of libp2p nodes. You can also use the [allow deny list in js-libp2p](https://docs.libp2p.io/concepts/security/dos-mitigation/#deny-specific-peers-or-create-an-allow-list-of-trusted-peers) to deny specific peers.However these require direct action & responsibility on your part and are no substitutes for upgrading js-libp2p. Therefore, we highly recommend upgrading your js-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about js-libp2p resource utilization.ReferencesDoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.Documentation on how to configure limits to prevent excessive resource consumption: https://github.com/libp2p/js-libp2p/blob/master/doc/LIMITS.mdDocumentation on how to configure metrics: https://github.com/libp2p/js-libp2p/blob/master/doc/METRICS.mdPlease see the related disclosure for go-libp2p: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw and rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8For more informationIf you have any questions or comments about this advisory, please email us at [[email protected]](mailto:[email protected]).
[]
null
7.5
null
null
null
GHSA-7662-cpv6-522m
A universal Cross-site scripting (UXSS) vulnerability in the Evernote Web Clipper extension before 7.11.1 for Chrome allows remote attackers to run arbitrary web script or HTML in the context of any loaded 3rd-party IFrame.
[]
null
null
6.1
null
null
GHSA-jfqg-q3jr-w9mv
Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account.  The predictable nature of the password allows an authenticated user with TMSH access to the BIG-IP system, or anyone with physical access to the FIPS HSM, the information required to generate the correct password.  On vCMP systems, all Guests share the same deterministic password, allowing those with TMSH access on one Guest to access keys of a different Guest.The following BIG-IP hardware platforms are affected: 10350v-F, i5820-DF, i7820-DF, i15820-DF, 5250v-F, 7200v-F, 10200v-F, 6900-F, 8900-F, 11000-F, and 11050-F.The BIG-IP rSeries r5920-DF and r10920-DF are not affected, nor does the issue affect software FIPS implementations or network HSM configurations.Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
null
6
null
null
null
GHSA-vv9c-r5jj-58f9
Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.
[]
null
null
7.8
null
null
CVE-2024-50196
pinctrl: ocelot: fix system hang on level based interrupts
In the Linux kernel, the following vulnerability has been resolved: pinctrl: ocelot: fix system hang on level based interrupts The current implementation only calls chained_irq_enter() and chained_irq_exit() if it detects pending interrupts. ``` for (i = 0; i < info->stride; i++) { uregmap_read(info->map, id_reg + 4 * i, &reg); if (!reg) continue; chained_irq_enter(parent_chip, desc); ``` However, in case of GPIO pin configured in level mode and the parent controller configured in edge mode, GPIO interrupt might be lowered by the hardware. In the result, if the interrupt is short enough, the parent interrupt is still pending while the GPIO interrupt is cleared; chained_irq_enter() never gets called and the system hangs trying to service the parent interrupt. Moving chained_irq_enter() and chained_irq_exit() outside the for loop ensures that they are called even when GPIO interrupt is lowered by the hardware. The similar code with chained_irq_enter() / chained_irq_exit() functions wrapping interrupt checking loop may be found in many other drivers: ``` grep -r -A 10 chained_irq_enter drivers/pinctrl ```
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-hh3g-4c3h-9xq5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Irfan Ardiansah Show Visitor IP Address allows Stored XSS.This issue affects Show Visitor IP Address: from n/a through 0.2.
[]
null
6.5
null
null
null
RHSA-2024:6990
Red Hat Security Advisory: kernel-rt security update
kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: vsock: remove vsock from connected table when connect is interrupted by a signal kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: SUNRPC: lock against -&gt;sock changing during sysfs read kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: ACPICA: Revert &#34;ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.&#34; kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
[ "cpe:/a:redhat:rhel_e4s:9.0::nfv", "cpe:/a:redhat:rhel_e4s:9.0::realtime" ]
null
7.8
null
null
null
CVE-2023-37997
WordPress Post List With Featured Image Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dharmesh Patel Post List With Featured Image plugin <= 1.2 versions.
[ "cpe:2.3:a:dharmeshpatel:post_list_with_featured_image:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
GHSA-3pqf-hwqx-7c78
In the Linux kernel, the following vulnerability has been resolved:memstick/ms_block: Fix a memory leak'erased_blocks_bitmap' is never freed. As it is allocated at the same time as 'used_blocks_bitmap', it is likely that it should be freed also at the same time.Add the corresponding bitmap_free() in msb_data_clear().
[]
null
null
null
null
null
CVE-2022-30887
Pharmacy Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.
[ "cpe:2.3:a:pharmacy_management_system_project:pharmacy_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-xjp5-5ph6-c66c
Missing Critical Step in Authentication in GitHub repository namelessmc/nameless prior to v2.0.2.
[]
null
7.5
null
null
null
GHSA-mf5x-rq5f-mc66
IBM Tivoli Provisioning Manager (TPM) before 5.1.1.1 IF0006, when its LDAP service is shared with other applications, does not require that an LDAP user be listed in the TPM user records, which allows remote authenticated users to execute SOAP commands that access arbitrary TPM functionality, as demonstrated by running provisioning workflows.
[]
null
null
null
null
null
ICSMA-21-161-01
ZOLL Defibrillator Dashboard
The web application allows a non-administrative user to upload a malicious file. This file could allow an attacker to remotely execute arbitrary commands.CVE-2021-27489 has been assigned to this vulnerability. A CVSS v3 base score of 9.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). The affected products utilize an encryption key in the data exchange process, which is hardcoded. This could allow an attacker to gain access to sensitive information.CVE-2021-27481 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). The affected products contain credentials stored in plaintext. This could allow an attacker to gain access to sensitive information.CVE-2021-27487 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). The affected product 's web application could allow a low privilege user to inject parameters to contain malicious scripts to be executed by higher privilege users.CVE-2021-27479 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N). The application allows users to store their passwords in a recoverable format, which could allow an attacker to retrieve the credentials from the web browser.CVE-2021-27485 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). The affected products contain insecure filesystem permissions that could allow a lower privilege user to escalate privileges to an administrative level user.CVE-2021-27483 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
[]
null
null
5.3
null
null
CVE-2015-0600
The mobility extension on Cisco Unified IP 9900 phones with firmware 9.4(.1) and earlier allows remote attackers to cause a denial of service (logoff) via crafted packets, aka Bug ID CSCuq12139.
[ "cpe:2.3:o:cisco:unified_ip_phones_9900_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_9951:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_9971:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
RHSA-2012:1347
Red Hat Security Advisory: kernel security and bug fix update
kernel: Buffer overflow in the HFS plus filesystem (different issue than CVE-2009-4020) kernel: sfc: potential remote denial of service through TCP MSS option
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
null
GHSA-jvw4-xfqp-q5qh
Integer overflow in the rtl_allocateMemory function in sal/rtl/source/alloc_global.c in the memory allocator in OpenOffice.org (OOo) 2.4.1, on 64-bit platforms, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted document, related to a "numeric truncation error," a different vulnerability than CVE-2008-2152.
[]
null
7.8
null
null
null
CVE-2023-45318
A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP git commit 80d4004. A specially crafted network packet can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
[ "cpe:2.3:a:silabs:gecko_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:weston-embedded:uc-http:*:*:*:*:*:*:*:*" ]
null
10
null
null
null