id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2003:121
|
Red Hat Security Advisory: sendmail security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
CVE-2017-7389
|
Multiple Cross-Site Scripting (XSS) were discovered in 'openeclass Release_3.5.4'. The vulnerabilities exist due to insufficient filtration of user-supplied data (meeting_id, user) passed to the 'openeclass-master/modules/tc/webconf/webconf.php' URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
|
[
"cpe:2.3:a:openeclass:openeclass:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2025-23951
|
WordPress Gallery: Hybrid – Advanced Visual Gallery plugin <= 1.4.0.2 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DivEngine Gallery: Hybrid – Advanced Visual Gallery allows Stored XSS.This issue affects Gallery: Hybrid – Advanced Visual Gallery: from n/a through 1.4.0.2.
|
[] | null | 6.5 | null | null | null |
CVE-2005-2513
|
Unknown vulnerability in HItoolbox for Mac OS X 10.4.2 allows VoiceOver services to read secure input fields.
|
[
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-qgjr-23fm-j744
|
Ipswitch WS_FTP Server Manager before 6.1.1, and possibly other Ipswitch products, allows remote attackers to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull account name.
|
[] | null | null | null | null | null |
|
GHSA-85xp-66c9-65fx
|
The CS5000 Fire Panel is vulnerable due to a default account that exists
on the panel. Even though it is possible to change this by SSHing into
the device, it has remained unchanged on every installed system
observed. This account is not root but holds high-level permissions that
could severely impact the device's operation if exploited.
|
[] | 9.3 | 9.8 | null | null | null |
|
GHSA-fcch-4hrv-x5c2
|
Two heap-based buffer overflow vulnerabilities exist in the TIFF parser functionality of Accusoft ImageGear 19.10. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger these vulnerabilities. Placeholder
|
[] | null | 8.8 | null | null | null |
|
GHSA-qq78-m4wp-cjf7
|
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
|
[] | null | null | null | null | null |
|
RHSA-2024:0962
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null | null |
CVE-2022-3925
|
Buddybadges <= 1.0.0 - Admin+ SQLi
|
The buddybadges WordPress plugin through 1.0.0 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users
|
[
"cpe:2.3:a:buddybadges_project:buddybadges:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null | null |
GHSA-gmg4-mhwj-mh76
|
A remote code execution vulnerability in the Android media framework (avc decoder). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37079296.
|
[] | null | null | 7.8 | null | null |
|
GHSA-32wr-8wxm-852c
|
Deserialization of Untrusted Data in NukeViet
|
includes/core/is_user.php in NukeViet before 4.3.04 deserializes the untrusted nvloginhash cookie (i.e., the code relies on PHP's serialization format when JSON can be used to eliminate the risk).
|
[] | null | 9.8 | null | null | null |
CVE-2023-21601
|
Adobe Dimension OBJ File Parsing Use-After-Free Information Disclosure Vulnerability
|
Adobe Dimension version 3.4.6 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2016-4161
|
Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows and OS X and before 11.2.202.621 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1096, CVE-2016-1098, CVE-2016-1099, CVE-2016-1100, CVE-2016-1102, CVE-2016-1104, CVE-2016-4109, CVE-2016-4111, CVE-2016-4112, CVE-2016-4113, CVE-2016-4114, CVE-2016-4115, CVE-2016-4120, CVE-2016-4160, CVE-2016-4162, and CVE-2016-4163.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHSA-2021:1475
|
Red Hat Security Advisory: bind security update
|
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.5 | null | null | null |
CVE-2023-5222
|
Viessmann Vitogate 300 Web Management Interface vitogate.cgi isValidUser hard-coded password
|
A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:viessmann:vitogate_300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:viessmann:vitogate_300:-:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 5.8 | null |
GHSA-xcv9-mgjj-4fmc
|
An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 in which a project member can leak credentials stored in site profile.
|
[] | null | 5 | null | null | null |
|
GHSA-vh4j-9cjw-6wxg
|
D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext.
|
[] | null | null | 8.1 | null | null |
|
GHSA-7427-8ggf-g35c
|
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
|
[] | null | 3.3 | null | null | null |
|
CVE-2020-5773
|
Improper Access Control in Teltonika firmware TRB2_R_00.02.04.01 allows a low privileged user to perform unauthorized write operations.
|
[
"cpe:2.3:o:teltonika-networks:trb245_firmware:00.02.04.01:*:*:*:*:*:*:*",
"cpe:2.3:h:teltonika-networks:trb245:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
CVE-2022-21176
|
Airspan Networks Mimosa SQL Injection
|
MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not properly sanitize user input, which may allow an attacker to perform a SQL injection and obtain sensitive information.
|
[
"cpe:2.3:a:airspan:mimosa_management_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:o:airspan:c6x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airspan:c6x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airspan:c5x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airspan:c5x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airspan:c5c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airspan:c5c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airspan:a5x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airspan:a5x:-:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
GHSA-9qwf-3rj7-3qff
|
An unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers and gain arbitrary command execution with elevated privileges.
|
[] | null | 8.1 | null | null | null |
|
GHSA-pvch-9x5f-vxhr
|
A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.60 through V5.38 and USG FLEX series firmware versions from V4.60 through V5.38 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device by executing a crafted CLI command.
|
[] | null | 7.2 | null | null | null |
|
CVE-2019-15091
|
filemgr.php in Artica Integria IMS 5.0.86 allows index.php?sec=wiki&sec2=operation/wiki/wiki&action=upload arbitrary file upload.
|
[
"cpe:2.3:a:artica:integria_ims:5.0.86:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-545v-m4hv-f5f2
|
LEDVANCE com.ledvance.smartplus.eu 2.1.10 allows a remote attacker to obtain sensitive information via the firmware update process.
|
[] | null | 7.5 | null | null | null |
|
GHSA-c552-8x9f-9xrp
|
SQL injection vulnerability in the AIRware Lexicon (air_lexicon) extension 0.0.1 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-3wh7-f7pv-9353
|
In OpenNMS Horizon, versions opennms-17.0.0-1 through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.7-1 are vulnerable to Stored Cross-Site Scripting, since the function `add()` performs improper validation checks on the input sent to the `foreign-source` parameter. Due to this flaw an attacker could bypass the existing regex validation and inject an arbitrary script which will be stored in the database.
|
[] | null | null | null | null | null |
|
GHSA-x6h4-hr96-7xf2
|
A vulnerability in the interaction between the Server Message Block (SMB) protocol preprocessor and the Snort 3 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error-checking when the Snort 3 detection engine is processing SMB traffic. An attacker could exploit this vulnerability by sending a crafted SMB packet stream through an affected device. A successful exploit could allow the attacker to cause the Snort process to reload, resulting in a DoS condition.
|
[] | null | 5.8 | null | null | null |
|
CVE-2022-24333
|
In JetBrains TeamCity before 2021.2, blind SSRF via an XML-RPC call was possible.
|
[
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
RHBA-2022:1352
|
Red Hat Bug Fix Advisory: .NET Core 3.1 on RHEL 7 bugfix update
|
urijs: Authorization Bypass Through User-Controlled Key
|
[
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 6.5 | null | null | null |
CVE-2016-10813
|
cPanel before 57.9999.54 allows self XSS during ftp account creation under addon domains (SEC-118).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-3j9f-4r3c-964g
|
In the Linux kernel, the following vulnerability has been resolved:powerpc/qspinlock: Fix deadlock in MCS queueIf an interrupt occurs in queued_spin_lock_slowpath() after we increment
qnodesp->count and before node->lock is initialized, another CPU might
see stale lock values in get_tail_qnode(). If the stale lock value happens
to match the lock on that CPU, then we write to the "next" pointer of
the wrong qnode. This causes a deadlock as the former CPU, once it becomes
the head of the MCS queue, will spin indefinitely until it's "next" pointer
is set by its successor in the queue.Running stress-ng on a 16 core (16EC/16VP) shared LPAR, results in
occasional lockups similar to the following:$ stress-ng --all 128 --vm-bytes 80% --aggressive \
--maximize --oomable --verify --syslog \
--metrics --times --timeout 5mwatchdog: CPU 15 Hard LOCKUP
......
NIP [c0000000000b78f4] queued_spin_lock_slowpath+0x1184/0x1490
LR [c000000001037c5c] _raw_spin_lock+0x6c/0x90
Call Trace:
0xc000002cfffa3bf0 (unreliable)
_raw_spin_lock+0x6c/0x90
raw_spin_rq_lock_nested.part.135+0x4c/0xd0
sched_ttwu_pending+0x60/0x1f0
__flush_smp_call_function_queue+0x1dc/0x670
smp_ipi_demux_relaxed+0xa4/0x100
xive_muxed_ipi_action+0x20/0x40
__handle_irq_event_percpu+0x80/0x240
handle_irq_event_percpu+0x2c/0x80
handle_percpu_irq+0x84/0xd0
generic_handle_irq+0x54/0x80
__do_irq+0xac/0x210
__do_IRQ+0x74/0xd0
0x0
do_IRQ+0x8c/0x170
hardware_interrupt_common_virt+0x29c/0x2a0
--- interrupt: 500 at queued_spin_lock_slowpath+0x4b8/0x1490
......
NIP [c0000000000b6c28] queued_spin_lock_slowpath+0x4b8/0x1490
LR [c000000001037c5c] _raw_spin_lock+0x6c/0x90
--- interrupt: 500
0xc0000029c1a41d00 (unreliable)
_raw_spin_lock+0x6c/0x90
futex_wake+0x100/0x260
do_futex+0x21c/0x2a0
sys_futex+0x98/0x270
system_call_exception+0x14c/0x2f0
system_call_vectored_common+0x15c/0x2ecThe following code flow illustrates how the deadlock occurs.
For the sake of brevity, assume that both locks (A and B) are
contended and we call the queued_spin_lock_slowpath() function.spin_lock_irqsave(A) |
spin_unlock_irqrestore(A) |
spin_lock(B) |
| |
▼ |
id = qnodesp->count++; |
(Note that nodes[0].lock == A) |
| |
▼ |
Interrupt |
(happens before "nodes[0].lock = B") |
| |
▼ |
spin_lock_irqsave(A) |
| |
▼ |
id = qnodesp->count++ |
nodes[1].lock = A |
| |
▼ |
Tail of MCS queue |
| spin_lock_irqsave(A)
▼ |
Head of MCS queue ▼
| CPU0 is previous tail
▼ |
Spin indefinitely ▼
(until "nodes[1].next != NULL") prev = get_tail_qnode(A, CPU0)
|
▼
prev == &qnodes[CPU0].nodes[0]
(as qnodes
---truncated---
|
[] | null | 5.5 | null | null | null |
|
GHSA-gpfj-4j6g-c4w9
|
Clipboard-based DOM-XSS
|
ImpactA self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected.The following @github/paste-markdown code snippet is triggered when the user pastes something and the browser's clipboard data contains an entry whose content-type is **text/HTML**.PatchesA security patch was released in [version 0.3.4](https://github.com/github/paste-markdown/releases/tag/v0.3.4).WorkaroundsA Content Security Policy that prevents `unsafe-inline` helps reduce the likelihood of this vulnerability being exploited in modern browsers.
|
[] | null | 6.5 | null | null | null |
CVE-2017-0265
|
Microsoft PowerPoint for Mac 2011 allows a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-0254 and CVE-2017-0264.
|
[
"cpe:2.3:a:microsoft:powerpoint_for_mac:2011:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2024-51246
|
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doPPTP function.
|
[
"cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
|
CVE-2024-0795
|
Create user API role not enforced
|
If an attacked was given access to an instance with the admin or manager role there is no backend authentication that would prevent the attacked from creating a new user with an `admin` role and then be able to use this new account to have elevated privileges on the instance
|
[
"cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | null | null |
CVE-2023-41111
|
An issue was discovered in Samsung Mobile Processor, Wearable Processor, Automotive Processor, and Modem (Exynos 9810, 9610, 9820, 980, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Modem 5123, Modem 5300, and Auto T5123). Improper handling of a length parameter inconsistency can cause abnormal termination of a mobile phone. This occurs in the RLC task and RLC module.
|
[
"cpe:2.3:o:samsung:exynos_9810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_9810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_9610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_9610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_9820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_9820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_9110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_9110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_w920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_modem_5123_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_modem_5123:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_modem_5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_modem_5300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_auto_t5123_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_auto_t5123:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
CVE-2009-2290
|
SQL injection vulnerability in the Boy Scout Advancement (com_bsadv) component 0.3 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a (1) account or (2) event task to index.php.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kim_eckert:com_bsadv:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kim_eckert:com_bsadv:0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kim_eckert:com_bsadv:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kim_eckert:com_bsadv:0.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2013-1706
|
Stack-based buffer overflow in maintenanceservice.exe in the Mozilla Maintenance Service in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 allows local users to gain privileges via a long pathname on the command line.
|
[
"cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-833m-299m-6gvp
|
Cross-site scripting (XSS) vulnerability in the XCloner plugin 3.1.2 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the excl_manual parameter in the xcloner_show page to wpadmin/plugins.php.
|
[] | null | null | null | null | null |
|
RHSA-2019:0231
|
Red Hat Security Advisory: spice security update
|
spice: Off-by-one error in array access in spice/server/memslot.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8 | null | null |
CVE-2019-9627
|
A buffer overflow in the kernel driver CybKernelTracker.sys in CyberArk Endpoint Privilege Manager versions prior to 10.7 allows an attacker (without Administrator privileges) to escalate privileges or crash the machine by loading an image, such as a DLL, with a long path.
|
[
"cpe:2.3:a:cyberark:endpoint_privilege_manager:*:*:*:*:*:*:*:*"
] | null | 7 | null | 6.9 | null |
|
GHSA-7w2f-6qq4-2286
|
Use of a hard-coded cryptographic key in Pancake versions < 4.13.29 allows an attacker to forge session cookies, which may lead to remote privilege escalation.
|
[] | null | null | null | null | null |
|
CVE-2024-54658
|
The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, Safari 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to a denial-of-service.
|
[] | null | 6.5 | null | null | null |
|
CVE-2022-1485
|
Use after free in File System API in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2023-36036
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-rrq2-j6vp-346q
|
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, and CVE-2015-0320.
|
[] | null | null | null | null | null |
|
CVE-2020-25748
|
A Cleartext Transmission issue was discovered on Rubetek RV-3406, RV-3409, and RV-3411 cameras (firmware versions v342, v339). Someone in the middle can intercept and modify the video data from the camera, which is transmitted in an unencrypted form. One can also modify responses from NTP and RTSP servers and force the camera to use the changed values.
|
[
"cpe:2.3:o:rubetek:rv-3406_firmware:339:*:*:*:*:*:*:*",
"cpe:2.3:o:rubetek:rv-3406_firmware:342:*:*:*:*:*:*:*",
"cpe:2.3:h:rubetek:rv-3406:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rubetek:rv-3409_firmware:339:*:*:*:*:*:*:*",
"cpe:2.3:o:rubetek:rv-3409_firmware:342:*:*:*:*:*:*:*",
"cpe:2.3:h:rubetek:rv-3409:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rubetek:rv-3411_firmware:339:*:*:*:*:*:*:*",
"cpe:2.3:o:rubetek:rv-3411_firmware:342:*:*:*:*:*:*:*",
"cpe:2.3:h:rubetek:rv-3411:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 6.8 | null |
|
RHSA-2019:2401
|
Red Hat Security Advisory: procps-ng security update
|
procps: Integer overflows leading to heap overflow in file2strvec
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7.3 | null | null |
CVE-2023-3010
|
Grafana is an open-source platform for monitoring and observability.
The WorldMap panel plugin, versions before 1.0.4 contains a DOM XSS vulnerability.
|
[
"cpe:2.3:a:grafana:grafana:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:grafana:worldmap_panel:*:*:*:*:*:grafana:*:*"
] | null | 7.3 | null | null | null |
|
CVE-2020-14430
|
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.
|
[
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk753_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk753:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk753s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk753s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk842_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk842:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr840_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs840_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk853_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk853:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*"
] | null | null | 9.6 | null | null |
|
CVE-2006-0047
|
packets.c in Freeciv 2.0 before 2.0.8 allows remote attackers to cause a denial of service (server crash) via crafted packets with negative compressed size values.
|
[
"cpe:2.3:a:freeciv:freeciv:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeciv:freeciv:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeciv:freeciv:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeciv:freeciv:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeciv:freeciv:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeciv:freeciv:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeciv:freeciv:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freeciv:freeciv:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freeciv:freeciv:2.0.7a:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2005-0924
|
Cross-site scripting (XSS) vulnerability in Adventia E-Data 2.0 allows remote attackers to inject arbitrary web script or HTML via a query keyword.
|
[
"cpe:2.3:a:adventia:e-data:2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-39283
|
Incomplete filtering of special elements in Intel(R) TDX module software before version TDX_1.5.01.00.592 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:tdx_module_software:1.5.05.46.698:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:tdx_module_software:*:*:*:*:*:*:*:*"
] | 8.5 | 6 | null | null | null |
|
GHSA-x5qp-cq7c-cv6q
|
Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21980, CVE-2022-24477.
|
[] | null | 8 | null | null | null |
|
GHSA-p684-f7fh-jv2j
|
Symfony has unsafe methods in the Request class
|
All 2.0.X, 2.1.X, 2.2.X, 2.3.X, 2.4.X, 2.5.X, and 2.6.X versions of the Symfony HttpFoundation component are affected by this security issue.This issue has been fixed in Symfony 2.3.27, 2.5.11, and 2.6.6. Note that no fixes are provided for Symfony 2.0, 2.1, 2.2, and 2.4 as they are not maintained anymore.DescriptionThe Symfony\Component\HttpFoundation\Request class provides a mechanism that ensures it does not trust HTTP header values coming from a "non-trusted" client. Unfortunately, it assumes that the remote address is always a trusted client if at least one trusted proxy is involved in the request; this allows a man-in-the-middle attack between the latest trusted proxy and the web server.The following methods are impacted: getPort(), isSecure(), and getHost(), and getClientIps().ResolutionAll impacted methods now check that the remote address is trusted, which fixes the issue.The patch for this issue is available [here](https://github.com/symfony/symfony/pull/14166).
|
[] | null | 5.3 | null | null | null |
CVE-2014-5148
|
Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.
|
[
"cpe:2.3:a:xen:xen:4.4.1:*:*:*:*:*:x64:*",
"cpe:2.3:o:xen:xen:4.4.0:-:*:*:*:*:x64:*"
] | null | null | null | 4.6 | null |
|
RHSA-2018:3410
|
Red Hat Security Advisory: xorg-x11-server security update
|
xorg-x11-server: Incorrect permission check in Xorg X server allows for privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.6 | null | null |
GHSA-4pxq-6xxj-8w94
|
A potential security vulnerability has been identified in the installer of HPE Version Control Repository Manager. The vulnerability could allow local escalation of privilege. HPE has made the following software update to resolve the vulnerability in HPE Version Control Repository Manager installer 7.6.14.0.
|
[] | null | 7.8 | null | null | null |
|
GHSA-f9wm-g526-8xc9
|
Insertion of Sensitive Information into Log File vulnerability in SERVIT Software Solutions.This issue affects affiliate-toolkit: from n/a through 3.4.4.
|
[] | null | 5.3 | null | null | null |
|
CVE-2016-4261
|
Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4260, and CVE-2016-4262.
|
[
"cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-f23f-xrf2-pvrp
|
Unspecified vulnerability in the Oracle Retail Service Backbone component in Oracle Retail Applications 14.0, 14.1, and 15.0 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to Install.
|
[] | null | null | 7.6 | null | null |
|
RHSA-2023:4986
|
Red Hat Security Advisory: Red Hat OpenShift Distributed Tracing 2.9.0 security update
|
golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters
|
[
"cpe:/a:redhat:openshift_distributed_tracing:2.9::el8"
] | null | 9.8 | null | null | null |
RHSA-2022:4947
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.59 security update
|
cri-o: memory exhaustion on the node when access to the kube api credentials: Stored XSS vulnerabilities in jenkins plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin
|
[
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 5.4 | null | null | null |
CVE-2022-21441
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3/IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2024-20287
|
A vulnerability in the web-based management interface of the Cisco WAP371 Wireless-AC/N Dual Radio Access Point (AP) with Single Point Setup could allow an authenticated, remote attacker to perform command injection attacks against an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the device. To exploit this vulnerability, the attacker must have valid administrative credentials for the device.
|
[
"cpe:2.3:o:cisco:wap371_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap371:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
RHSA-2021:2865
|
Red Hat Security Advisory: RHV Manager (ovirt-engine) security update [ovirt-4.4.7]
|
nodejs-ua-parser-js: Regular expression denial of service via the regex nodejs-glob-parent: Regular expression denial of service nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-underscore: Arbitrary code execution via the template function
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 7.2 | null | null | null |
GHSA-xf7p-6q7m-4grr
|
Cross-Site Request Forgery (CSRF) vulnerability in WP Easy Pay WP EasyPay – Square for WordPress plugin <= 4.1 versions.
|
[] | null | 4.3 | null | null | null |
|
RHSA-2015:0645
|
Red Hat Security Advisory: redhat-access-plugin-openstack security update
|
dashboard: log file arbitrary file retrieval
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null | null |
CVE-2020-7553
|
A CWE-787 Out-of-bounds Write vulnerability exists in IGSS Definition (Def.exe) version 14.0.0.20247 that could cause Remote Code Execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition.
|
[
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-mwhv-wr6g-vr99
|
Open redirect vulnerability in the web portal in IBM Tealeaf Customer Experience before 8.7.1.8847 FP10, 8.8 before 8.8.0.9049 FP9, 9.0.0 and 9.0.1 before 9.0.1.1117 FP5, 9.0.1A before 9.0.1.5108_9.0.1A FP5, 9.0.2 before 9.0.2.1223 FP3, and 9.0.2A before 9.0.2.5224_9.0.2A FP3 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
[] | null | null | 6.8 | null | null |
|
GHSA-xh44-f8rg-h6h3
|
The Extended Control List (ECL) feature of the Java Virtual Machine (JVM) in Lotus Notes Client R5 allows malicious web site operators to determine the existence of files on the client by measuring delays in the execution of the getSystemResource method.
|
[] | null | null | null | null | null |
|
GHSA-qhg2-622w-f7v7
|
Cross-Site Request Forgery (CSRF) vulnerability in GiveWP.This issue affects GiveWP: from n/a through 3.15.1.
|
[] | null | 5.4 | null | null | null |
|
GHSA-6x8r-frrv-mcw4
|
The (1) VBScript (VBScript.dll) and (2) JScript (JScript.dll) scripting engines 5.1 and 5.6, as used in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, do not properly decode script, which allows remote attackers to execute arbitrary code via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-crh9-vmx5-ggr8
|
SourceCodester Sentiment Based Movie Rating System 1.0 is vulnerable to SQL Injection in /msrps/movies.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-g5mr-95rv-q4hc
|
A flaw was found in Openstack manilla owning a Ceph File system "share", which enables the owner to read/write any manilla share or entire file system. The vulnerability is due to a bug in the "volumes" plugin in Ceph Manager. This allows an attacker to compromise Confidentiality and Integrity of a file system. Fixed in RHCS 5.2 and Ceph 17.2.2.
|
[] | null | 9.1 | null | null | null |
|
CVE-2015-1547
|
The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.
|
[
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-h38p-2234-q2gv
|
Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 107.0.5304.62 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chrome security severity: Medium)
|
[] | null | 4.3 | null | null | null |
|
CVE-2009-3857
|
Buffer overflow in Softonic International SciTE 1.72 allows user-assisted remote attackers to cause a denial of service (application crash) via a Ruby (.rb) file containing a long string, which triggers the crash when a scroll bar is used.
|
[
"cpe:2.3:a:softonic:scite:1.72:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-7rxg-vrrp-x3gv
|
In multiple functions of WifiNetworkFactory.java, there is a missing permission check. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-266700762
|
[] | null | 7.8 | null | null | null |
|
GHSA-cp64-jc72-8g82
|
Buffer overflow in UnrealIRCd 3.2beta11 through 3.2.8, when allow::options::noident is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-jg88-2ggx-qcpg
|
Insufficient output sanitization in TCExam 14.2.2 allows a remote, unauthenticated attacker to conduct persistent cross-site scripting (XSS) attacks via the self-registration feature.
|
[] | null | null | null | null | null |
|
CVE-2022-42511
|
In EmbmsSessionData::encode of embmsdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241762712References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
CVE-2022-22545
|
A high privileged user who has access to transaction SM59 can read connection details stored with the destination for http calls in SAP NetWeaver Application Server ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756.
|
[
"cpe:2.3:a:sap:netweaver_abap:700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:701:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:710:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:711:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:730:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:740:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:750:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:751:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:752:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:753:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:754:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:755:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_abap:756:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 | null |
|
GHSA-577r-87gc-vm67
|
OpenText Documentum Content Server has an inadequate protection mechanism against SQL injection, which allows remote authenticated users to execute arbitrary code with super-user privileges by leveraging the availability of the dm_bp_transition docbase method with a user-created dm_procedure object, as demonstrated by use of a backspace character in an injected string. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2513.
|
[] | null | null | 8.8 | null | null |
|
CVE-2021-37071
|
There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos.
|
[
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2025-26744
|
WordPress JetBlog plugin <= 2.4.3 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound JetBlog allows DOM-Based XSS. This issue affects JetBlog: from n/a through 2.4.3.
|
[] | null | 6.5 | null | null | null |
GHSA-f5r3-qx7g-cx6v
|
An issue in C-CHIP (com.cchip.cchipamaota) v.1.2.8 allows a remote attacker to obtain sensitive information via the firmware update process.
|
[] | null | 9.1 | null | null | null |
|
GHSA-qwwf-j766-5g2p
|
Successful exploitation of the vulnerability could allow an attacker with administrator credentials for the access point to inject malicious JavaScript into the payload of web traffics, potentially leading to session hijacking and denial-of-service (DoS).
|
[] | null | 2.4 | null | null | null |
|
GHSA-x4mx-vv42-5h8p
|
Vulnerability in Oracle Java SE (component: Install). Supported versions that are affected are Oracle Java SE: 8u451 and 8u451-perf. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE executes to compromise Oracle Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Java SE. Note: Applies to installation process on client deployment of Java. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | 7.3 | null | null | null |
|
CVE-2018-15155
|
OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/fax_dispatch.php after modifying the "hylafax_enscript" global variable in interface/super/edit_globals.php.
|
[
"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
GHSA-6f64-6j5j-jvvx
|
PostGIS 2.x before 2.3.3, as used with PostgreSQL, allows remote attackers to cause a denial of service via crafted ST_AsX3D function input, as demonstrated by an abnormal server termination for "SELECT ST_AsX3D('LINESTRING EMPTY');" because empty geometries are mishandled.
|
[] | null | 7.5 | null | null | null |
|
CVE-2016-3214
|
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3199.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
GHSA-m5wv-rfcq-fg25
|
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
|
[] | null | null | null | null | null |
|
CVE-2024-44170
|
A privacy issue was addressed by moving sensitive data to a more secure location. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, macOS Sequoia 15. An app may be able to access user-sensitive data.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-qxmp-rwpq-4m3m
|
mar_read.c in the Updater in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows local users to gain privileges or cause a denial of service (out-of-bounds write) via a crafted name of a Mozilla Archive (aka MAR) file.
|
[] | null | null | null | null | null |
|
CVE-2006-4468
|
Multiple unspecified vulnerabilities in Joomla! before 1.0.11, related to unvalidated input, allow attackers to have an unknown impact via unspecified vectors involving the (1) mosMail, (2) JosIsValidEmail, and (3) josSpoofValue functions; (4) the lack of inclusion of globals.php in administrator/index.php; (5) the Admin User Manager; and (6) the poll module.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2023-21688
|
NT OS Kernel Elevation of Privilege Vulnerability
|
NT OS Kernel Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2006-1071
|
Cross-site scripting (XSS) vulnerability in index.php in DVguestbook 1.2.2 allows remote attackers to inject arbitrary web script or HTML via the page parameter.
|
[
"cpe:2.3:a:dvguestbook:dvguestbook:1.2.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-31894
|
WordPress Ebook Downloader plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Infoway LLC Ebook Downloader allows Stored XSS. This issue affects Ebook Downloader: from n/a through 1.0.
|
[] | null | 6.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.