id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-jrp2-pgjj-vwpm
|
CWE-532: Insertion of Sensitive Information into Log Files vulnerability exists that could cause the disclosure
of FTP server credentials when the FTP server is deployed, and the device is placed in debug mode by an
administrative user and the debug files are exported from the device.
|
[] | 4 | 6 | null | null | null |
|
CVE-2017-0393
|
A denial of service vulnerability in libvpx in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-30436808.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 7.1 | null |
|
GHSA-2mxq-q8p2-g2c8
|
The SALESmanago plugin for WordPress is vulnerable to Log Injection in versions up to, and including, 3.2.4. This is due to the use of a weak authentication token for the /wp-json/salesmanago/v1/callbackApiV3 API endpoint which is simply a SHA1 hash of the site URL and client ID found in the page source of the website. This makes it possible for unauthenticated attackers to inject arbitrary content into the log files, and when combined with another vulnerability this could have significant consequences.
|
[] | null | 5.3 | null | null | null |
|
CVE-2023-46735
|
Symfony potential Cross-site Scripting in WebhookController
|
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response.
|
[
"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
GHSA-hmf5-722w-w2h8
|
savesettings.php in phpGB 1.20 and earlier does not require authentication, which allows remote attackers to cause a denial of service or execute arbitrary PHP code by using savesettings.php to modify config.php.
|
[] | null | null | null | null | null |
|
CVE-2006-1105
|
Pixelpost 1.5 beta 1 and earlier allows remote attackers to obtain configuration information via a direct request to includes/phpinfo.php, which calls the phpinfo function. NOTE: the vendor has disputed some issues from the original disclosure, but due to the vagueness of the dispute, it is not clear whether the vendor is disputing this particular issue.
|
[
"cpe:2.3:a:pixelpost:pixelpost:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pixelpost:pixelpost:1.5_beta1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-50966
|
erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value in a JOSE header.
|
[
"cpe:2.3:a:potatosalad:erlang-jose:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-wjh2-79x3-xjv2
|
Maian Uploader 4.0 allows remote attackers to obtain sensitive information via a request without the height parameter to load_flv.js.php, which reveals the installation path in an error message.
|
[] | null | null | null | null | null |
|
GHSA-hf32-jrph-5wp2
|
A maliciously crafted MODEL file in libodxdll.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
|
[] | null | 7.5 | null | null | null |
|
GHSA-rf42-prrr-mrq8
|
cPanel before 78.0.18 allows code execution via an addforward API1 call (SEC-480).
|
[] | null | null | null | null | null |
|
GHSA-9w5f-mw3p-pj47
|
Prototype Pollution(PP) vulnerability in setByPath
|
SummaryThere is a Prototype Pollution(PP) vulnerability in dot-diver. It can leads to RCE.DetailsIn this code, there is no validation for Prototpye Pollution.PoCImpactIt is Prototype Pollution(PP) and it can leads to Dos, RCE, etc.CreditsTeam : NodeBoB최지혁 ( Jihyeok Choi )이동하 ( Lee Dong Ha of ZeroPointer Lab )강성현 ( kang seonghyeun )박성진 ( sungjin park )김찬호 ( Chanho Kim )이수영 ( Lee Su Young )김민욱 ( MinUk Kim )
|
[] | null | 7.3 | null | null | null |
CVE-2008-4688
|
core/string_api.php in Mantis before 1.1.3 does not check the privileges of the viewer before composing a link with issue data in the source anchor, which allows remote attackers to discover an issue's title and status via a request with a modified issue number.
|
[
"cpe:2.3:a:mantis:mantis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.1.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2014-1236
|
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
|
[
"cpe:2.3:a:graphviz:graphviz:2.34.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-7h23-73pm-7fwg
|
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 4.4 | null | null | null |
|
CVE-2006-3288
|
Unspecified vulnerability in the TFTP server in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51), when configured to use a directory path name that contains a space character, allows remote authenticated users to read and overwrite arbitrary files via unspecified vectors.
|
[
"cpe:2.3:h:cisco:wireless_control_system:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-37jm-8h4h-w52w
|
Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /items/manage_item.php.
|
[] | null | 8.8 | null | null | null |
|
GHSA-r2hv-xh5m-g4w7
|
An issue in franfinance before v.2.0.27 allows a remote attacker to execute arbitrary code via the validation.php, and controllers/front/validation.php components.
|
[] | null | 9.8 | null | null | null |
|
GHSA-grcp-38px-frjx
|
Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2021-26418, CVE-2021-28478.
|
[] | null | 7.1 | null | null | null |
|
GHSA-63w7-6gxr-7jjw
|
An issue was discovered in ProxyServlet.java in the /proxy servlet in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. The value of the X-Forwarded-Host header overwrites the value of the Host header in proxied requests. The value of X-Forwarded-Host header is not checked against the whitelist of hosts that ZCS is allowed to proxy to (the zimbraProxyAllowedDomains setting).
|
[] | null | 7.5 | null | null | null |
|
GHSA-p855-vrqj-mwc3
|
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control 12.1.0.4 and 12.1.0.5 allows remote attackers to affect availability via unknown vectors related to Agent Next Gen.
|
[] | null | null | null | null | null |
|
CVE-2022-1897
|
Out-of-bounds Write in vim/vim
|
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
|
[
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2024-12648
|
Buffer overflow in TIFF data EXIF tag processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.
|
[] | null | 9.8 | null | null | null |
|
GHSA-j32q-jfrq-f6mr
|
SQL injection vulnerability in forum_duzen.php in phpKF allows remote attackers to execute arbitrary SQL commands via the fno parameter.
|
[] | null | null | null | null | null |
|
CVE-2015-8488
|
Cybozu Office 10.3.0 allows remote attackers to read image files via a crafted e-mail message, a different vulnerability than CVE-2015-8487.
|
[
"cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 | null |
|
CVE-2019-13671
|
UI spoofing in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof security UI via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
CVE-2014-6336
|
Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 6 does not properly validate redirection tokens, which allows remote attackers to redirect users to arbitrary web sites and spoof the origin of e-mail messages via unspecified vectors, aka "Exchange URL Redirection Vulnerability."
|
[
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_6:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-29vj-j5w5-pcph
|
Insufficient input validation leading to memory overread on the NetScaler Management Interface NetScaler ADC and NetScaler Gateway
|
[] | 9.3 | 7.5 | null | null | null |
|
RHSA-2016:0595
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.7 update
|
tomcat: non-persistent DoS attack by feeding data by aborting an upload EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null | null |
GHSA-crh9-79wp-32wv
|
Improper input validation in the firmware for Intel(R) Server Board M10JNP2SB before version 7.210 may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
RHSA-2022:4888
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | 6.1 | null | null |
CVE-2024-37005
|
Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
|
A maliciously crafted X_B file, when parsed in pskernel.DLL through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash,read sensitive data, or execute arbitrary code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
GHSA-c4mx-98gv-gxm8
|
Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.
|
[] | null | null | null | null | null |
|
GHSA-9w8j-43xw-xc7m
|
The WP MultiTasking WordPress plugin through 0.1.12 does not have CSRF check when updating welcome popups, which could allow attackers to make logged admins perform such action via a CSRF attack
|
[] | null | 6.5 | null | null | null |
|
CVE-2022-29161
|
Crypto script service uses hashing algorithm SHA1 with RSA for certificate signature in xwiki-platform
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The XWiki Crypto API will generate X509 certificates signed by default using SHA1 with RSA, which is not considered safe anymore for use in certificate signatures, due to the risk of collisions with SHA1. The problem has been patched in XWiki version 13.10.6, 14.3.1 and 14.4-rc-1. Since then, the Crypto API will generate X509 certificates signed by default using SHA256 with RSA. Administrators are advised to upgrade their XWiki installation to one of the patched versions. If the upgrade is not possible, it is possible to patch the module xwiki-platform-crypto in a local installation by applying the change exposed in 26728f3 and re-compiling the module.
|
[
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2021-36394
|
In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2024-34658
|
Out-of-bounds read in Samsung Notes allows local attackers to bypass ASLR.
|
[
"cpe:2.3:a:samsung:notes:4.4.21.62:*:*:*:*:*:*:*",
"cpe:2.3:a:samsung:notes:*:*:*:*:*:*:*:*"
] | null | 4 | null | null | null |
|
CVE-2025-49290
|
WordPress Off-Canvas Sidebars & Menus (Slidebars) plugin <= 0.5.8.4 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jory Hogeveen Off-Canvas Sidebars & Menus (Slidebars) allows Reflected XSS. This issue affects Off-Canvas Sidebars & Menus (Slidebars): from n/a through 0.5.8.4.
|
[] | null | 7.1 | null | null | null |
GHSA-4hg5-c2vj-gh5g
|
A vulnerability was found in code-projects Online Shoe Store 1.0. It has been classified as critical. This affects an unknown part of the file /admin/admin_feature.php. The manipulation of the argument product_code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
CVE-2023-3713
|
The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'profile_magic_check_smtp_connection' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update the site options arbitrarily. This can be used by attackers to achieve privilege escalation.
|
[
"cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-43718
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
RHSA-2016:2766
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Stack overflow via ecryptfs and /proc/$pid/environ kernel: Fork of large process causes memory corruption
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null | null |
GHSA-8mc9-xv53-c76c
|
plow has local buffer overflow vulnerability
|
[] | null | null | null | null | null |
|
CVE-2019-19922
|
kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:aff_baseboard_management_controller:a700:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
cisco-sa-aironet-dos-VHr2zG9y
|
Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability
|
A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device.
The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.
Cisco has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability.
|
[] | null | null | 8.6 | null | null |
GHSA-9r89-c96g-gf22
|
TOTOLINK A720R V4.1.5cu.532_ B20210610 is vulnerable to Incorrect Access Control.
|
[] | null | 9.8 | null | null | null |
|
RHBA-2012:0881
|
Red Hat Bug Fix Advisory: freeradius bug fix and enhancement update
|
freeradius: does not respect expired passwords when using the unix module
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2015-7456
|
IBM Spectrum Scale 4.1.1 before 4.1.1.4, and 4.2.0.0, allows remote authenticated users to discover object-storage admin passwords via unspecified vectors.
|
[
"cpe:2.3:a:ibm:spectrum_scale:4.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_scale:4.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_scale:4.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_scale:4.2.2.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-m2cw-h5p2-hjpq
|
Embedded web server command injection vulnerability in Lexmark devices through 2021-12-07.
|
[] | null | 9.8 | null | null | null |
|
GHSA-6h9m-rcph-4xpw
|
A flaw exists in FlashBlade Purity whereby an authenticated user with access to FlashBlade’s object store protocol can impact the availability of the system’s data access and replication protocols.
|
[] | null | 7.7 | null | null | null |
|
CVE-2022-29748
|
Simple Client Management System 1.0 is vulnerable to SQL Injection via \cms\admin?page=client/manage_client&id=.
|
[
"cpe:2.3:a:simple_client_management_system_project:simple_client_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-v7vf-rv5x-3j8g
|
Cross-site scripting (XSS) vulnerability in the Tinytax module (aka Tinytax taxonomy block) 5.x before 5.x-1.10-1 for Drupal allows remote authenticated users to inject arbitrary web script or HTML, probably by creating a crafted taxonomy term.
|
[] | null | null | null | null | null |
|
CVE-2021-25845
|
Improper validation of the ChassisID TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows attackers to cause a denial of service due to a NULL pointer dereference via a crafted lldp packet.
|
[
"cpe:2.3:o:moxa:vport_06ec-2v26m_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v26m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v36m-t_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v36m-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v36m-ct_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v36m-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v36m-ct-t_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v36m-ct-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v42m_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v42m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v42m-t_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v42m-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v42m-ct_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v42m-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v42m-ct-t_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v42m-ct-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v60m_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v60m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v60m-t_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v60m-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v60m-ct_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v60m-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v60m-ct-t_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v60m-ct-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v80m_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v80m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v80m-t_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v80m-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v80m-ct_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v80m-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v80m-ct-t_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v80m-ct-t:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-689v-jwr8-2x32
|
ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file.
|
[] | null | null | null | null | null |
|
GHSA-vvwv-hcqf-p6jp
|
Unspecified vulnerability in Oracle Communications Server 2.0; GlassFish Enterprise Server 2.1.1, 3.0.1, and 3.1.1; and Sun Java System App Server 8.1 and 8.2 allows remote attackers to affect availability via unknown vectors related to Web Container.
|
[] | null | null | null | null | null |
|
CVE-2023-28645
|
Secure view can be bypassed by using internal API endpoint in Nextcloud richdocuments
|
Nextcloud richdocuments is a Nextcloud app integrating the office suit Collabora Online. In affected versions the secure view feature of the rich documents app can be bypassed by using unprotected internal API endpoint of the rich documents app. It is recommended that the Nextcloud Office app (richdocuments) is upgraded to 8.0.0-beta.1, 7.0.2 or 6.3.2. Users unable to upgrade may mitigate the issue by taking steps to restrict the ability to download documents. This includes ensuring that the `WOPI configuration` is configured to only serve documents between Nextcloud and Collabora. It is highly recommended to define the list of Collabora server IPs as the allow list within the Office admin settings of Nextcloud.
|
[
"cpe:2.3:a:nextcloud:richdocuments:*:*:*:*:*:*:*:*"
] | null | 5.7 | null | null | null |
RHSA-2019:3011
|
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
|
kernel: hw: Spectre SWAPGS gadget vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.9 | null | null |
CVE-2025-0417
|
Valmet DNA Lack of protection against brute force attacks
|
Lack of protection against brute force attacks in Valmet DNA visualization in DNA Operate. The possibility to make an arbitrary number of login attempts without any rate limit gives an attacker an increased chance of guessing passwords and then performing switching operations.
|
[] | 7 | null | null | null | null |
CVE-2008-0866
|
Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Workshop allow remote attackers to inject arbitrary web script or HTML via an invalid action URI, which is not properly handled by NetUI page flows.
|
[
"cpe:2.3:a:bea:weblogic_workshop:8.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_workshop:8.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_workshop:8.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_workshop:8.1:sp5:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2016-10041
|
An issue was discovered in Sprecher Automation SPRECON-E Service Program before 3.43 SP0. Under certain preconditions, it is possible to execute telegram simulation as a non-admin user. As prerequisites, a user must have created an online-connection, validly authenticated and authorized as administrator, and executed telegram simulation. After that, the online-connection must have been closed. Incorrect caching of client data then may lead to privilege escalation, where a subsequently acting non-admin user is permitted to do telegram simulation. In order to exploit this vulnerability, a potential attacker would need to have both a valid engineering-account in the SPRECON RBAC system as well as access to a service/maintenance computer with SPRECON-E Service Program running. Additionally, a valid admin-user must have closed the service connection beforehand without closing the program, having executed telegram simulation; the attacker then has access to the running software instance. Hence, there is no risk from external attackers.
|
[
"cpe:2.3:a:sprecher-automation:sprecon-e_service_program:3.42:sp0:*:*:*:*:*:*"
] | null | null | 7.5 | 4.6 | null |
|
RHSA-2023:7368
|
Red Hat Security Advisory: c-ares security update
|
c-ares: buffer overflow in config_sortlist() due to missing string length check
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 8.6 | null | null | null |
GHSA-95j3-jpcx-676c
|
Windows DWM Core Library Elevation of Privilege Vulnerability.
|
[] | null | 7.8 | null | null | null |
|
CVE-2010-0562
|
The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping.
|
[
"cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-f849-jc2j-f4g4
|
In getMessagesByPhoneNumber of MmsSmsProvider.java, there is a possible access to restricted tables due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224769956
|
[] | null | 5.5 | null | null | null |
|
ICSA-23-348-06
|
Siemens OPC UA Implementation in SINUMERIK ONE and SINUMERIK MC
|
The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation.
This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate.
|
[] | null | 7.5 | null | null | null |
GHSA-x2jq-8m8h-c762
|
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.
|
[] | null | null | null | null | null |
|
RHSA-2004:073
|
Red Hat Security Advisory: metamail security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
CVE-2025-59561
|
WordPress Smart Blocks Plugin <= 2.4 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in hashthemes Smart Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Smart Blocks: from n/a through 2.4.
|
[] | null | 4.3 | null | null | null |
CVE-2018-2673
|
Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: POS). Supported versions that are affected are 2.7, 2.8 and 2.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:hospitality_simphony:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_simphony:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_simphony:2.9:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-5w58-7q99-f8cr
|
In several methods of JobStore.java, uncaught exceptions in job map parsing could lead to local persistent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-246541702
|
[] | null | 5.5 | null | null | null |
|
GHSA-v6cp-qj97-x87h
|
A vulnerability was found in code-projects Nero Social Networking Site 1.0. It has been classified as critical. This affects an unknown part of the file /index.php. The manipulation of the argument fname/lname/login/password2/cpassword/address/cnumber/email/gender/propic/month leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
CVE-2006-3808
|
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
|
[
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-wf4q-g5g8-q8w9
|
A vulnerability has been found in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected by this vulnerability is an unknown functionality of the file /htdocs/cardEdit.php. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 2 | 3.5 | null | null | null |
|
CVE-2013-3791
|
Unspecified vulnerability in Enterprise Manager (EM) Base Platform 10.2.0.5 and EM DB Control 11.1.0.7 in Oracle Enterprise Manager Grid Control allows remote attackers to affect integrity via unknown vectors related to User Interface Framework.
|
[
"cpe:2.3:a:oracle:enterprise_manager:10.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_database_control:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_grid_control:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
cisco-sa-20190710-asa-ftd-dos
|
Cisco ASA and FTD Software Cryptographic TLS and SSL Driver Denial of Service Vulnerability
|
A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly.
The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition.
Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190710-asa-ftd-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190710-asa-ftd-dos"]
|
[] | null | null | 8.6 | null | null |
GHSA-m2g5-gpqx-rwvw
|
SerializableProvider in RESTEasy in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to execute arbitrary code.
|
[] | null | null | 9.8 | null | null |
|
GHSA-cjph-938c-9p3j
|
A SQL injection vulnerability in SupplierDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via the parameters such as "searchTxt".
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-44015
|
WordPress Users Control plugin <= 1.0.16 - Local File Inclusion vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Users Control allows PHP Local File Inclusion.This issue affects Users Control: from n/a through 1.0.16.
|
[
"cpe:2.3:a:userscontrol:users_control:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2015-4844
|
Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
|
[
"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-j44r-m3r9-2886
|
IBM Spectrum Scale 4.2 and 5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 171247.
|
[] | null | null | null | null | null |
|
GHSA-8q7j-85mf-jv76
|
The server in DirectoryService in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-cpj9-hvqw-3m28
|
A vulnerability, which was classified as critical, has been found in Campcodes Church Management System 1.0. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259904.
|
[] | null | 7.3 | null | null | null |
|
GHSA-9262-x6ph-8rp3
|
In the Linux kernel, the following vulnerability has been resolved:rtw89: cfo: check mac_id to avoid out-of-boundsSomehow, hardware reports incorrect mac_id and pollute memory. Check index
before we access the array.UBSAN: array-index-out-of-bounds in rtw89/phy.c:2517:23
index 188 is out of range for type 's32 [64]'
CPU: 1 PID: 51550 Comm: irq/35-rtw89_pc Tainted: G OE
Call Trace:
<IRQ>
show_stack+0x52/0x58
dump_stack_lvl+0x4c/0x63
dump_stack+0x10/0x12
ubsan_epilogue+0x9/0x45
__ubsan_handle_out_of_bounds.cold+0x44/0x49
? __alloc_skb+0x92/0x1d0
rtw89_phy_cfo_parse+0x44/0x7f [rtw89_core]
rtw89_core_rx+0x261/0x871 [rtw89_core]
? __alloc_skb+0xee/0x1d0
rtw89_pci_napi_poll+0x3fa/0x4ea [rtw89_pci]
__napi_poll+0x33/0x1a0
net_rx_action+0x126/0x260
? __queue_work+0x217/0x4c0
__do_softirq+0xd9/0x315
? disable_irq_nosync+0x10/0x10
do_softirq.part.0+0x6d/0x90
</IRQ>
<TASK>
__local_bh_enable_ip+0x62/0x70
rtw89_pci_interrupt_threadfn+0x182/0x1a6 [rtw89_pci]
irq_thread_fn+0x28/0x60
irq_thread+0xc8/0x190
? irq_thread_fn+0x60/0x60
kthread+0x16b/0x190
? irq_thread_check_affinity+0xe0/0xe0
? set_kthread_struct+0x50/0x50
ret_from_fork+0x22/0x30
</TASK>
|
[] | null | 7.8 | null | null | null |
|
CVE-2022-22294
|
A SQL injection vulnerability exists in ZFAKA<=1.43 which an attacker can use to complete SQL injection in the foreground and add a background administrator account.
|
[
"cpe:2.3:a:zfaka_project:zfaka:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHSA-2009:1134
|
Red Hat Security Advisory: seamonkey security update
|
Thunderbird mail crash
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-mcv3-c4v3-2pf4
|
The DCC server command in the Mirc 5.5 client doesn't filter characters from file names properly, allowing remote attackers to place a malicious file in a different location, possibly allowing the attacker to execute commands.
|
[] | null | null | null | null | null |
|
GHSA-34m9-46jh-jxm4
|
Huawei HiLink AI Life product has an identity authentication bypass vulnerability. Successful exploitation of this vulnerability may allow attackers to access restricted functions.(Vulnerability ID:HWPSIRT-2022-42291)This vulnerability has been assigned a (CVE)ID:CVE-2022-48470
|
[] | null | 4 | null | null | null |
|
CVE-2010-2027
|
Mathematica 7, when running on Linux, allows local users to overwrite arbitrary files via a symlink attack on (1) files within /tmp/MathLink/ or (2) /tmp/fonts$$.conf.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfram_research:mathematica:7:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
CVE-2020-14960
|
A SQL injection vulnerability in PHP-Fusion 9.03.50 affects the endpoint administration/comments.php via the ctype parameter,
|
[
"cpe:2.3:a:php-fusion:php-fusion:9.03.50:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 | null |
|
GHSA-qg5x-rr96-mrpg
|
The affected On-Premise cnMaestro is vulnerable inside a specific route where a user can upload a crafted package to the system. An attacker could abuse this user-controlled data to execute arbitrary commands on the server.
|
[] | null | 7.3 | null | null | null |
|
GHSA-476w-cp8h-fwc5
|
The Enfold Enfold WordPress theme before 4.8.4 was vulnerable to Reflected Cross-Site Scripting (XSS). The vulnerability is present on Enfold versions previous than 4.8.4 which use Avia Page Builder.
|
[] | null | null | null | null | null |
|
CVE-2024-40695
|
IBM Cognos Analytics file upload
|
IBM Cognos Analytics 11.2.0 through 11.2.4 FP4 and
12.0.0 through 12.0.4
could be vulnerable to malicious file upload by not validating the content of the file uploaded to the web interface. Attackers can make use of this weakness and upload malicious executable files into the system, and it can be sent to victim for performing further attacks.
|
[
"cpe:2.3:a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:12.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:12.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:12.0.4:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
CVE-2022-35897
|
An stack buffer overflow vulnerability leads to arbitrary code execution issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. If the attacker modifies specific UEFI variables, it can cause a stack overflow, leading to arbitrary code execution. The specific variables are normally locked (read-only) at the OS level and therefore an attack would require direct SPI modification. If an attacker can change the values of at least two variables out of three (SecureBootEnforce, SecureBoot, RestoreBootSettings), it is possible to execute arbitrary code.
|
[
"cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
GHSA-28mp-cx45-6mwq
|
The [field] shortcode included with the Custom Content Shortcode WordPress plugin before 4.0.1, allows authenticated users with a role as low as contributor, to access arbitrary post metadata. This could lead to sensitive data disclosure, for example when used in combination with WooCommerce, the email address of orders can be retrieved
|
[] | null | 4.3 | null | null | null |
|
GHSA-92qw-m8c2-5f3v
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | null | 6.5 | null | null |
|
CVE-2025-27263
|
WordPress Doctor Appointment Booking Plugin <= 1.0.0 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Doctor Appointment Booking allows SQL Injection. This issue affects Doctor Appointment Booking: from n/a through 1.0.0.
|
[] | null | 8.5 | null | null | null |
GHSA-5wj4-j4h5-22p5
|
In the Linux kernel, the following vulnerability has been resolved:wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failuresSyzkaller reported a hung task with uevent_show() on stack trace. That
specific issue was addressed by another commit [0], but even with that
fix applied (for example, running v6.12-rc5) we face another type of hung
task that comes from the same reproducer [1]. By investigating that, we
could narrow it to the following path:(a) Syzkaller emulates a Realtek USB WiFi adapter using raw-gadget and
dummy_hcd infrastructure.(b) During the probe of rtl8192cu, the driver ends-up performing an efuse
read procedure (which is related to EEPROM load IIUC), and here lies the
issue: the function read_efuse() calls read_efuse_byte() many times, as
loop iterations depending on the efuse size (in our example, 512 in total).This procedure for reading efuse bytes relies in a loop that performs an
I/O read up to *10k* times in case of failures. We measured the time of
the loop inside read_efuse_byte() alone, and in this reproducer (which
involves the dummy_hcd emulation layer), it takes 15 seconds each. As a
consequence, we have the driver stuck in its probe routine for big time,
exposing a stack trace like below if we attempt to reboot the system, for
example:task:kworker/0:3 state:D stack:0 pid:662 tgid:662 ppid:2 flags:0x00004000
Workqueue: usb_hub_wq hub_event
Call Trace:
__schedule+0xe22/0xeb6
schedule_timeout+0xe7/0x132
__wait_for_common+0xb5/0x12e
usb_start_wait_urb+0xc5/0x1ef
? usb_alloc_urb+0x95/0xa4
usb_control_msg+0xff/0x184
_usbctrl_vendorreq_sync+0xa0/0x161
_usb_read_sync+0xb3/0xc5
read_efuse_byte+0x13c/0x146
read_efuse+0x351/0x5f0
efuse_read_all_map+0x42/0x52
rtl_efuse_shadow_map_update+0x60/0xef
rtl_get_hwinfo+0x5d/0x1c2
rtl92cu_read_eeprom_info+0x10a/0x8d5
? rtl92c_read_chip_version+0x14f/0x17e
rtl_usb_probe+0x323/0x851
usb_probe_interface+0x278/0x34b
really_probe+0x202/0x4a4
__driver_probe_device+0x166/0x1b2
driver_probe_device+0x2f/0xd8
[...]We propose hereby to drastically reduce the attempts of doing the I/O
reads in case of failures, restricted to USB devices (given that
they're inherently slower than PCIe ones). By retrying up to 10 times
(instead of 10000), we got reponsiveness in the reproducer, while seems
reasonable to believe that there's no sane USB device implementation in
the field requiring this amount of retries at every I/O read in order
to properly work. Based on that assumption, it'd be good to have it
backported to stable but maybe not since driver implementation (the 10k
number comes from day 0), perhaps up to 6.x series makes sense.[0] Commit 15fffc6a5624 ("driver core: Fix uevent_show() vs driver detach race")[1] A note about that: this syzkaller report presents multiple reproducers
that differs by the type of emulated USB device. For this specific case,
check the entry from 2024/08/08 06:23 in the list of crashes; the C repro
is available at https://syzkaller.appspot.com/text?tag=ReproC&x=1521fc83980000.
|
[] | null | 5.5 | null | null | null |
|
GHSA-x75m-fc3j-ppfm
|
Cross-site scripting in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable information disclosure via local access.
|
[] | null | 4.1 | null | null | null |
|
GHSA-9ggj-qxwx-fj5p
|
Use after free in Cast in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific interactions to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | 8.8 | null | null | null |
|
GHSA-58rr-w6gv-4p4h
|
The Kyber reference implementation before 9b8d306, when compiled by LLVM Clang through 18.x with some common optimization options, has a timing side channel that allows attackers to recover an ML-KEM 512 secret key in minutes. This occurs because poly_frommsg in poly.c does not prevent Clang from emitting a vulnerable secret-dependent branch.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-37961
|
Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.